Mobile Security

Authorities of South Africa create their own browser to continue to use Flash

ZDNet reports that the South Africa Revenue service has created its own browser to continue using the Adobe Flash Player…

New worm for Android spreads rapidly via WhatsApp

ESET security researcher Lukas Stefanko reported a new malware: he said that a new worm for Android automatically spreads through…

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the…

Extortionists hack into Cellmate men’s chastity belts

Last fall, researchers from Pen Test Partners reported on the insecurity of extremely unusual gadgets – Cellmate men’s chastity belts,…

Nissan source code leaked due to admin: admin credentials

The source code for mobile apps and internal tools for Nissan’s North American division has leaked. The leak was due…

How Teens Tricking Their Parents With The Help of Their Electronic Devices

How Teens Tricking Their Parents With The Help of Their Electronic Devices

We all know that the internet has become a major…

Types of malware on your Android [PART 3]

Types of malware on your Android [PART 3]

In this part of our new category, we want to…

TYPES OF MALWARE ON YOUR ANDROID [PART 2]

TYPES OF MALWARE ON YOUR ANDROID [PART 2]

Forewarned is forearmed, this is the second part of our…

TYPES OF MALWARE ON YOUR ANDROID

TYPES OF MALWARE ON YOUR ANDROID

We all used to the fact that malware only affects…

How to become an expert in application security (Security tips)

How to become an expert in application security (Security tips)

Every day hundreds of new mobile applications appear in the…

Free Wi-fi danger

How to use Wi-Fi for free and keep your data private

Where do you plan to spend the most of your…