-
Cyber attacks can be prevented through code analysis
May 24, 2022Software that is free of serious security vulnerabilities could be on the horizon after a pair...
-
Facebook tracks user’s secret information and data
May 21, 2022The Meta Pixel, which belongs to Facebook parent company Meta, is a small piece of JavaScript code stored...
-
Pegasus spyware targets Bangladesh-Indian government phones
May 20, 2022While it has been revealed that UK government officials have been infected with the NSO Group’s...
-
Beware of dodgy emails from scammer on LinkedIn
May 13, 2022LinkedIn is the number one social media brand used by cybercriminals who want you to click...
-
Hackers can steal your passwords from web browser
May 7, 2022After years spent warning users to create strong and unique passwords, security analysts are now also...
-
Democrats want to harass Elon Musk
May 2, 2022Suddenly Senate Democrats are interested in fairness on social media after Elon Musk made a successful...
-
Log4Shell ranked top exploited vulnerability of 2021
April 30, 2022The top exploited vulnerability of 2021 was the Log4Shell affecting Apache’s Log4j library that was disclosed...
-
While Netflix crashes, big tech companies face trouble
April 28, 2022World’s most popular OTT [Over The Top] platform Netflix is in dire crisis as its share...
-
Billionaire Elon Musk finally buys Twitter
April 26, 2022Billionaire entrepreneur Elon Musk purchased the social-media giant for $44 billion, turning it into a privately...
-
Diamonds are a quantum computer’s best friend
April 24, 2022Australian quantum computing researchers are continuing to distinguish themselves on the world stage, with two local...