It has been revealed that would be attackers can easily break into the gallery on any iPhone or iPad using three emojis, and the phone number of the victim, and it works on iOS 11.1 too.
By using script editing tools, some Shadow of War players are showing their dislike of loot boxes by leveraging an exploit that allows them to receive as many loot boxes as they want for free.
An enterprising developer has suggested that a Chrome extension can leverage the "last seen" data on WhatsApp App to help determine sleeping patterns of users and also potentially with whom they talk.
A researcher from Google's Project Zero suggests Microsoft may be putting users of Windows 7 at risk by giving priority to Windows 10 for patches, thereby leaving clues on how to attack the older OS.
A web security expert recently found a bug in Microsoft's Internet Explorer web browser that utilizes HTML tags that potentially reveal a user's browsing habits to an unauthorized third party.
A vulnerability in Windows OLE is being exploited by cybercriminals. The attack makes use of an innocuous-looking PowerPoint attachment, which in turn downloads malware to spy on users.
During this weekend's Season 3 tournament which was hosted by Ubisoft, several exploits and bugs caused some headaches for the professional players, even one to win after using a known exploit.
Researchers at Core Security have found multiple vulnerabilities in Kaspersky Anti-Virus for Linux File Server that would allow attackers to gain root access. The company has since issued a fix.
Google has revealed yet another vulnerability in Windows - because Microsoft failed to fix it correctly - that can reportedly allow locally authenticated attackers to access kernel memory space.
A massive swath of internal Microsoft data has been leaked online, containing 32TB of internal builds for Windows 10 and the source code for some of the core systems for the operating system.
Microsoft has claimed that its new Windows 10 S operating system is protected from all known ransomware. Matthew Hickey, a security researcher was able to prove it wrong in just three hours.
Microsoft has quietly issued a fix for a critical vulnerability in Windows Defender's Malware Protection Engine. The problem was discovered by the same Google researcher who found an earlier exploit.
A new report from Russian cyber security company Kaspersky Lab has revealed that almost the entirety of WannaCry's victims were on Windows 7, with Windows XP users being insignificant in number.
The highly infectious ransomware known as 'Wannacry', which has infected thousands of computers across the world, has evolved to combat a temporary solution discovered by researchers.
A Google security researcher has reportedly discovered a "crazy bad" vulnerability in Windows, which can easily spread. Although full details aren't available yet, a report is expected to follow soon.
Security researchers over at McAfee have found that attackers are exploiting an unpatched vulnerability within Microsoft Office, which allows for full control to be taken of the victim's PC.
A Wi-Fi chipset used in both Android and Apple devices has been exploited by researchers to upload and execute arbitrary code. An iOS patch has been issued but Android users have been left waiting.
An exploit within the web platforms of WhatsApp and Telegram was found by Check Point Security, which could allow hackers to take full control of your account just by sending an innocent-looking file.
After initial silence on the issue, Google has now put out a statement regarding the alleged CIA exploits exposed by WikiLeaks. Google says many of the issues in Chrome and Android have been fixed.
Researchers have discovered a critical issue in the popular web application framework and patched it a couple of days ago. But since then the number of attacks targeting it have gone up dramatically.
Yesterday's data dump from WikiLeaks that brought many CIA documents to light highlighted the agency's ability to hack into many of our personal devices. Apple has now publicly addressed that.
Adult streaming sites are exploiting a loophole in Google's video hosting services, utilizing YouTube's private video publishing feature as a backdoor for storing their content.
A new exploit can crash and disable the Messages app on any device running iOS 8 through to iOS 10. By attaching a malicious vCard to a message, the victim's iPhone crashes indefinitely.
A web security researcher has discovered a bug within Microsoft Edge's SmartScreen feature, which could allow scammers to create legitimate-looking warning messages and block reputable websites.
Mozilla has updated its Firefox browser to fix a bug that exposes Tor users. The bug so far has only been leveraged against Windows users but technically affects users running OS X or Linux too.
A group of scammers from Nigeria infected themselves with malware, which led to the revelation of how their crime works, and how they manage to steal money from businesses worldwide.
The flaw in question affects equipment used by cell towers, radios, networks, and of course, our own mobile phones. While there's a patch available, most devices won't ever receive it.
A security researcher has found an exploit-chain that can be used on Android devices with Qualcomm chips to break into the device's disk encryption. This exposes all of the user's data.
A zero-day vulnerability is being exploited in the wild across all platforms, as Adobe's engineers scramble to put out a patch this week. This is the third such instance in as many months.
A credible zero-day vulnerability is being auctioned off on criminal websites. The exploit can be used on all versions of Windows including 10 and can even supposedly bypass Microsoft's EMET suite.
Microsoft and Adobe are warning users against two zero-day vulnerabilities that are being used in the wild. Microsoft already patched its software with yesterday's Patch Tuesday.
The Lenovo Solution Centre, pre-bundled on almost every Lenovo PC, has been found to have a flaw that could put affected PCs at risk of attack, by allowing elevated privileges on the machine.
WIGI is a vulnerability scanner that searches for outdated plugins and offers to download/install them from official sources.
Thought you'd seen it all? This team of enterprising hackers who not only spread ransomware but also run a 'referral' program encouraging victims to further spread the malware might surprise you.
According to at least one hacker and security expert, Microsoft's mobile OS gets top points for security. He claims that Windows Phone is the most secure mobile OS, beating both iOS and Android.
After announcing an iOS 9 exploit bounty earlier this year, security firm Zerodium has announced that one team was able to create an exploit that was eligible for the full million dollar payout.
After the Xcode blunder that happened over a month ago at Apple's App Store, hundreds of apps have recently been deleted from the store, due to their ability to record private data.
Security researchers plan to present findings on an easily-performed exploit of OS X's Gatekeeper software at the Virus Bulletin Conference in Prague, Czech Republic on Thursday.
New security firm Zerodium is offering a million dollar payout for anyone who can provide a jailbreak for iOS 9. The initiative has been dubbed ‘The Million Dollar iOS 9 Bug Bounty'.