The use of phishing websites is one of the most common hacking techniques, as it is highly functional for threat actors to collect a lot of information from their targets.
A British security specialist reported finding a critical vulnerability in Shazam, the popular music recognition app, which would allow threat actors to extract a user’s location data by sending a
U.S. Army members are being affected by a security flaw… again. This time, the incident is related to Untappd, an app to share beer photos and check-in bar visits. A
Technology has multiple applications in the field of education, which allows improving learning processes, although it cannot force students to assist to their classes, at least not until now. According
Currently there is a mobile app related to any need, service or hobby, even to arrange sexual encounters with complete strangers. However, like any online service, such applications are exposed
Metadata contained in old posts contains precise location coordinates According to a research carried out by cybersecurity specialists, the location metadata contained in the social network Twitter posts may be