Security News

Twitter’s Support account published the following announcement on Tuesday: We recently found that some email addresses and phone numbers provided for account security may have been used...

Data collected for two-factor authentication purposes “inadvertently” matched users to targeted-advertising lists, the company admits.

After exposing private tweets, plaintext passwords, and personal information for hundreds of thousands of its users, here is a new security blunder social networking company Twitter admitted...

Twitter on Tuesday apologized after "inadvertently" using phone numbers and email addresses for advertising even though the personal data was provided for account security. Twitter users' phone...

Fully patched Pixel 2 devices, even those running Android 10 preview, are impacted by a vulnerability that has already been abused in attacks, a Google Project Zero security researcher has...

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android. What's more? The Android zero-day...

Intelligence services developed system, says security outfit The Egyptian government has been targeting and tracking citizens in a sophisticated spying program that allows it to read emails, log...

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats,...

Prey, provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Scheduled Automations, a new capability available to...

Researchers have discovered a way to use wireless earbuds as a biometric authentication system.