If you use your credit or debit cards multiple times a day, you might be under the assumption that the mobile point of sale machine…
Category: Cybersecurity
Tech Support Scammers Use Call Optimization Services to Lure Victims
Hackers and scammers can always be expected to come out with ingenious ways of phishing and intruding illegitimately into the systems of innocent users to…
PowerGhost Cryptocurrency Mining Malware Targets Corporate Networks
A new malware, aptly named PowerGhost has been detected and it has some unique characteristics that leave the owners of the targeted systems under attack—clueless…
Google Introduces ‘Titan Security Key’ for Improved Online Security
Google utilized the recently held Next conference to reveal its physical key for use in authenticating logins. The name given to it is Titan Security…
Crypto Mining Apps Now Banned on Google Play Store
Google’s periodical policy review on the Google Play Store has resulted in a complete ban on apps that have cryptocurrency mining as their main application….
Researchers Revealed New Spectre-Class Attack
Ever since Spectre was discovered at the beginning of this year, the hardware vulnerability has been giving sleepless nights to processor makers like Intel and…
