Apple has already been battling issues related to battery usage on its iPhones, as reported by the phone users on various counts, and has been…
Category: News
Bug Bounty Programs in 2019
Bug bounty programs have become a solid staple to help turn hackers and computer security researchers away from any black hat activity while still providing…
What Is Metamorphic Virus and How It Works
Even as the antivirus laboratories keep detecting firmware to mitigate the damage caused by malware, those involved in creating the malware appear to be a…
U.S. Identifies Suspect in CIA ‘Vault 7’ Leak
More than 14 months after WikiLeaks published its “Vault 7” leak of secret codes that the United States Central Intelligence Agency employed to snoop on…
Twitter Asks 330 Million Users to Change Passwords after Bug Found
Twitter has discovered that its systems have been storing the confidential information of users’ passwords in plain text instead of in coded numbers. The company…
PoC Code Published for Triggering a BSOD on Windows
A hardware expert has released a proof-of-concept code (PoC) which can crash virtually any Windows computer in a matter of seconds. The interesting fact about…
