Security Archive
News
In September, British Airways informed its customers of a massive data breach. The breach saw some 380,000 people affected, with personal information like their names, address, and credit
Read More
News
3 days ago, we reported that some police forces in the UK are purchasing the iPhone hacking device GrayKey. At that time, Apple was unable to stop this
Read More
Security
You might have read that it’s safe to browse the web using an https connection instead of http. Websites with an https certificate are indicated with a padlock
Read More
News
Android and iOS apps are using a new advertising tactic that targets users who uninstalled their apps. With Uninstall Trackers, these apps can find out when a user
Read More
News
At least three different English police forces have apparently spent thousands of pounds on new iPhone hacking tech. Lancashire, Derbyshire, and Nottinghamshire have purchased licenses for GrayKey, a
Read More
Security
Routers are among the most important internet devices we use today. Almost all internet connectivity is router-based and so they have a major role to play in both
Read More
News
Oh boy, you guys….we’re getting into some really shady territory when it comes to new hacks. The more prepared our cybersecurity tools, the more inventive the hackers are
Read More
Security
Are you wondering what the difference between Shadowsocks and VPNs are? Look no further. In this article, I’ll be pitting Shadowsocks VS VPNs to show you the differences
Read More
Security
If you want to learn anything about anything, visit Reddit. This is one platform where you’ll get expert opinions from different people all over the world. Each year,
Read More
News
Have you received a message that says that your Facebook account has been cloned? You’re not alone. There’s a Facebook 2nd Friend Request hoax going around, and it’s
Read More
Security
Mac users: You are not as secure as you think you are. Macs are not impervious to hacks and attacks. However, there are steps you can take to
Read More
News
Russian hackers have managed to use Hotel WiFi networks to gain access to sensitive high-level information. This common hacking method is extremely effective, even when the targets are
Read More