Mobile
Android
Companies must ensure that the employee devices are up to date while data is transferred
Companies and their employees are dependent on their business devices. Security gaps are therefore all the more critical as in the current case.
What is...
editor -
Android
Cyberattack method was described that exploit weaknesses in the classic Bluetooth protocol
Security researchers of Bluetooth describe gaps in the authentication process of the classic Bluetooth devices that allow a third party device to connect to...
editor -
Applications
Users of the Edison mail app had external emails in their inbox
The Edison mail client is available for the iOS mobile operating systems and the desktop operating system MacOS. However, instead of synchronizing their own...
editor -
Applications
Hackers have sold 40 million user registration data for the popular Wishbone app
Today, hackers have published information about the 40 million registered users of the popular mobile app- Wishbone; which allows users to compare two elements...
sammi -
Cybercrime
Numerous Apple devices are attacked from a short distance via Bluetooth
The new security notice, which draws attention to a new vulnerability in the Bluetooth interface is actually only given a medium risk level. However,...
editor -
iPhone
DOJ Blasts Apple on Lack of Encryption Backdoor – Again
A law enforcement official says the encryption has delayed the terrorists' investigation; Apple has rejected it. Although FBI technicians have access to data from...
sammi -