Security Users of compromised macs can be spied through CloudMensis backdoor Blossom Hazarika Aug 5, 2022
Security 29 models of DrayTek routers impacted by critical RCE vulnerability Blossom Hazarika Aug 5, 2022
Featured Top 5 apps that can let you hide pictures and videos on your iOS or Android phones Somya Agrawal Aug 4, 2022
Security An anonymous source leaked 4TB of data from Israeli intelligence company… Tista Karmakar Aug 4, 2022
Security German Chambers of Industry and Commerce shut down all its websites after a… Tista Karmakar Aug 4, 2022
New Release Memes flooding on Twitter about iPhone 14: Get the latest update! Kaushiki Ghosh Aug 4, 2022
Security Copies of the data-stealing virus Mars Stealer being distributed by a phony… Somya Agrawal Aug 4, 2022
Security Anonymous Collective ruled and defaced a Chinese government website Team Tech Outlook Aug 4, 2022
Security Attackers target Russian organizations with the new Woody RAT malware Pavan Naidu Aug 4, 2022
Web & Social Media Sri Lankan police officers were seen playing cricket with children Neha Kunder Aug 4, 2022
Web & Social Media Sadhguru and Isha Outreach are India’s biggest advertisers on Meta for social… Pavan Naidu Aug 3, 2022
Security Kremlin lists Anonymous collective on the top 4 active hacking groups defending… Pavan Naidu Aug 3, 2022
Software & Apps Internet Explorer can still be awakened on the Windows 11 OS Tista Karmakar Aug 3, 2022
Web & Social Media Clip from Allu Arjun’s “I Am That Change” makes rounds on… Blossom Hazarika Aug 3, 2022
E-commerce Paytm and PhonePe’s ‘Sound Devices’ creates battle ground for… Blossom Hazarika Aug 3, 2022
Security Security Researcher informs public exposure of 250M+ Indian UAN database records… Blossom Hazarika Aug 3, 2022
Gadgets Ultrahuman Ring is the first ever real-time metabolic tracker available in India Tista Karmakar Aug 3, 2022