Using YouTube to steal your files security.cyber google social media Article 2712 words, published Sep 19 2024 40 votes
“Clickless” iOS exploits infect Kaspersky iPhones with never-before-seen malware security ios Article 1152 words, published Jun 1 2023 21 votes
Webcam hacking—The story of how I gained unauthorized Camera access on iOS and macOS ios apple security Article 1713 words 4 votes
The IOTA cryptocurrency network has been completely shut down for over 5 days while an exploit in the official wallet is investigated Article 367 words 7 votes
Critical Windows 10 exploit discovered which allows arbitrary software to be installed under the guise of Windows updates security microsoft Article 660 words 20 votes
Android exploit of system camera apps enabled a malicious app to record and upload photos, video and audio with only "storage" permission android security privacy Article 1463 words 10 votes
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies facebook privacy security Article 1077 words 16 votes
The stakes are too high for Apple to spin the iPhone exploits apple ios security google Article 1095 words 6 votes