Cybersecurity News

Top Software Testing Services

Apple’s Touch Id- a possible gateway to your iCloud account?

A security specialist at an IT firm Computest, Thijs Alkemade, found a security flaw in Apple’s Touch ID feature in February. This possible security breach could leave the iCloud accounts of the apple users vulnerable and accessible to the attackers when apple’s touch Id feature is used for verification. Authentication Flaw According to the specialist,…
Read more

Frustrated Researcher Drops Two Tor Zero-days Vulnerabilities

The Tor browser is used by users worldwide because of the security and privacy it provides to its users. It works on the principle of Onion Routing, which routes traffic through multiple servers and is encrypted each step of the way. This mechanism makes it difficult to trace what is viewed by the user.  However,…
Read more

17 Year Old Teenager and Two Others Are Arrested for the Biggest Twitter Attack

A 17-year-old teen and two other 19 and 22-year-old individuals are arrested who were behind the biggest twitter attack that happened on 15th July 2020. It is being considered as the most disastrous cyber attack in the history of social media.

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

There’s a voice that keeps on calling me

Ulysses, Ulysses – Soaring through all the galaxies. In search of Earth, flying in to the night. Ulysses, Ulysses – Fighting evil and tyranny, with all his power, and with all of his might. Ulysses – no-one else can do the things you do. Ulysses – like a bolt of thunder from the blue. Ulysses…
Read more

80 days around the world

80 days around the world, we’ll find a pot of gold just sitting where the rainbow’s ending. Time – we’ll fight against the time, and we’ll fly on the white wings of the wind. 80 days around the world, no we won’t say a word before the ship is really back. Round, round, all around…
Read more