A massive, unprotected database exposed over 184 million records, including Apple login credentials, emails, and passwords for other major services. Discovered by a security researcher, the data was likely stolen by infostealer malware. Users are urged to change Apple ID ...
Google is now automating the process of users changing stolen or weak passwords with a new feature it has brought to Chrome’s password manager. Announced at the 2025 I/O developer conference, Google Chrome’s new authentication feature warns users if their ...
A significant cyberattack breached TeleMessage, a communications app (a Signal fork) used by numerous US government officials, including White House staff, Secret Service, and diplomatic personnel. Reuters’ review of leaked data confirmed widespread exposure, raising serious data security questions. While ...
Joe Hindy / Android Authority TL;DR Google Play Protect will soon detect when an app changes its icon, and alert users to this behavior. Malicious apps sometimes change their app icon to evade removal, so this should help in a ...
The shadowy world of cyber espionage has a new player on the field: a sneaky piece of malware dubbed “LostKeys.” According to Google, a Russian state-backed malware crew known as COLDRIVER has been using LostKeys since the start of the ...
Meta just scored a significant win in its long-running battle against NSO Group, the makers of Pegasus spyware. A US jury has awarded Meta $167 million in damages against the spyware maker. This is a landmark decision in the fight ...
For as long as there have been Android smartphones, there have been scams that people would try to exploit through them and their many apps, and this includes a variety of bank scams, one of which Google seems to now ...
If you use the AirPlay feature on your Apple devices, you shouldn’t miss this news. Security researchers at cybersecurity company Oligo have found major flaws in Apple’s AirPlay protocol that let cybercriminals hack compatible Apple and other devices on the ...
When we think about hackers, we typically think about loners or hacker groups that live off the grid. We also think about people who would fear any governmental figure. However, there are hackers that are funded by the government. According ...
The Federal Bureau of Investigation has placed a massive bounty of $10 million for providing information regarding the “Salt Typhoon”, a highly sought-after Chinese hacking group. Last year, the group infiltrated the highly sensitive networks of multiple US-based telecommunication providers, ...