Ultrasound Tracking Could Be Used to Deanonymize Tor Users

Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser…

Attacks on Phones of Bitcoin Moguls Continue with Recent KeepKey Security Breach

On the last day of 2016, KeepKey, a vendor of Bitcoin hardware wallets, has notified users…

MongoDB Databases Held for Ransom by Mysterious Attacker

An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing and replacing…

MongoDB Databases Held Up for Ransom by Mysterious Attacker

An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing their content,…

The Age of Resilience – Security in 2017

 Security is one of the few tech sectors that thrives primarily thanks to the cruel intentions…

Android Was 2016’s Most Vulnerable Product

With 2016 officially over, we can crown Android as 2016's product with most vulnerabilities, and Oracle…

WTF is a VPN

 You’re watching a movie. A criminal is trying to evade a crime scene in a sports…

Google Fixes User Tracking Issue in Pixel Smartphones

Google engineers have addressed a serious user privacy bug that affected only versions of the Android…