Sunday, November 29, 2020
Cryptocurrency Coins

What Is Crypto Mining Malware?

Mining malware has been on the rise and more hackers discover that they can make money easily by mining cryptocurrencies. Mining cryptocurrencies is not a no-brainer for everyone because it costs...
Samsung Galaxy S8 smartphone

Android Vulnerability Lets Hackers Take Over Your Camera

A security vulnerability in some Android phones allows attackers to access your camera app and invade your privacy (it can even get location data from the photos it takes). The vulnerability...

What are the 5 Best Ways to Burglarproof your Home?

While there are some state-of -the-art security systems that might cost you an arm and a leg, securing your home from burglars and petty thieves doesn't have to be ridiculously expensive. Owning...
Cybersecurity graphic

Compromised Emails Are One Of Your Greatest Security Threats

A compromised e-mail account is one of the greatest security threats you face online. It can lead to robbery, a complete takeover of your social media accounts, theft of your games and in-app purchases, among other things!
Samsung Galaxy S8 smartphone

Samsung Galaxy S10 Can Be Unlocked With Invalid Fingerprints

The new Samsung Galaxy S10 phone has a faulty fingerprint sensor that approves unregistered fingerprints (meaning a thief can unlock your phone, even if they don't have your prints). A software...
data center

Blockchain And The Right To Be Forgotten

Blockchain has been making waves in the media and at the table in many companies for its ability to offer immutability and tamper evidence, reduced data corruption, enhanced security, among other...
Using LUKS to encrypt a USB drive in Linux

Encrypt Your USB Drive And Protect Your Data

Identity thieves and other kinds of cybercriminals can dig up personal information such as passwords, emails, and communications to help them gather details required to take out credit in their victims'...
iPhone 6 on a wooden table

Dangerous, Fake Lightning Cables Entering Mass Production

We live in a time where security testing is becoming more open and public, and with that comes some unusual activities -- such as the mass production of fake iPhone Lightning...