More

    Hacking - Page 2

    Cyberattack Shuts Down Pipelines And Causes Gas Shortage

    Gas stations across the United States experienced gasoline shortages due to the shutdown of Colonial Pipeline. The shortages resulted in some gas stations running...

    Cisco Issues Update For ACE, Other Vulnerabilities In SD-WAN vManage

    Cisco has issued software updates to address multiple vulnerabilities in their SD-WAN vManage software that could allow remote arbitrary code execution (ACE), unauthorized access...

    Dell Issues Update For Severe Privilege Escalation Vulnerabilities

    Dell has released an update for the severe access control vulnerability CVE-2021-21551, which affects Dell computers dating back to 2009. The vulnerability can cause privilege escalation, information disclosure, and denial of service.

    Apple Releases Update For ACE Vulnerability In WebKit

    Apple has released iOS 14.5.1, which provides a memory corruption bug fix and patches an arbitrary code execution (ACE) vulnerability in WebKit -- a...

    Giving Out Your E-mail Increases Your Chances Of Getting Hacked

    Does it seem as if nearly every time you install an app, it wants you to register with your email or phone number? To...

    QR Code Safety Checklist: Protect Yourself From Scammers

    QR codes carry some security risks due to scammers taking advantage of unsuspecting people.

    Don’t Install WhatsApp Pink: It’s a Virus

    A scammer has been trying to get people to download a fake WhatsApp update (this means it's a trojan) that promises to provide you...

    Common Cryptocurrency Scams To Avoid

    Cryptocurrency scammers are always on the prowl for unsuspecting victims, but they seem to come out in full force during bull runs. What is a...

    SIM Swapping Is A Serious Risk: Here’s What You Can Do

    SIM swapping is a risk that endangers users of SMS two-factor authentication (SMS 2FA). SMS two-factor authentication is normally used to add a layer...

    Got A New Android Phone? Turn On These Crucial Security Settings

    If you purchased a new phone with Android 9 (also called Android Pie), you should turn on the following security settings to protect your...

    Android Vulnerability Lets Hackers Take Over Your Camera

    A security vulnerability in some Android phones allows attackers to access your camera app and invade your privacy (it can even get location data...

    Compromised Emails Are One Of Your Greatest Security Threats

    A compromised e-mail account is one of the greatest security threats you face online. It can lead to robbery, a complete takeover of your social media accounts, theft of your games and in-app purchases, among other things!

    Latest articles

    Newsletter

    Subscribe to stay updated.