Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as...
According to a recent survey report, many big IT decision-makers see Enterprise Communication and Collaboration (EC&C ) apps like Slack, Dropbox, etc...
Researchers specializing in enterprise data protection services have analyzed more than a dozen mobile apps provided by shared car companies and have...
Man In The Middle Attack Over SSL A group of security researchers found a critical man in the middle attack implementation gap...
A flaw in certificate pinning exposed customers of a number of high-profile banks to man-in-the-middle attacks on both iOS and Android devices....
Selenium powered Python script to automate searching the web for vulnerable applications. DorkNet can take a single dork or a list of...
The IT security researchers at Verify.ly, a service responsible for scanning the binary coding of iOS apps to identify any prevailing security...
Apps that use 3rd-party updater over insecure HTTP channels subject to MiTM attacks. Camtasia, uTorrent, and a large number of other Mac...
Officials at Check Point, the IT security vendor, have discovered a rogue app on the Google Play Store that is exploiting the...
While whole world was worried about the FREAK vulnerability of the browsers, hundreds of popular apps of Android and iOS are still...