Tech & Science
Security researchers at Comparitech recently published their discovery of a database exposed by Telmate, a service that prison inmates use to communicate with family...
Hi, what are you looking for?
Security researchers at Comparitech recently published their discovery of a database exposed by Telmate, a service that prison inmates use to communicate with family...
With the incident, social engineering techniques put 46,000 veterans at risk of being fraud victims. The VA said malicious actors used “social engineering techniques”...
Assist Wireless LLC, a U.S. mobile virtual network operator that provides phone services to the underprivileged with government support. The company reported at the...
During the last week, several new breaches have been added this week by Breach Clarity (35 in total). Details of some of the most...
The analysis of the data leak reveals that the user identifiable data was spread across several datasets, according to The Independent. Of these pockets...
BHIM (Bharat Interface for Money) is an Indian mobile payment app developed by the National Payments Corporation of India (NPCI), a government body. The...
Twitter’s new Android flaw is related to malicious apps can could compromise user accounts, if people are operating on older Android operating systems. While...
How secure is digital banking and how comfortable to customers feel? The answers to this question may have shifted somewhat following a recent –...
It has been revealed by the specialist technology media (such as Computer Weekly) that a misconfigured cloud server at global cosmetics brand Avon was...
Drizly (an innovator in online alcohol delivery) has issued an email to customers. A copy of the communication was obtained by TechCrunch, and this...