Google finds vulnerability flaw in Pixel and other phones

Google researchers found a serious vulnerability flaw on a number of Android devices. The phones in…

World’s Smartest Person’s Account Hacked

No doubt, the smartest person in the MCU (Marvel Cinematic Universe) is the iron man. He…

AMD Has Rebadged Their Budget GPUs Again, Now Called 600-series

This week, AMD silently began selling five “new” GPUs to OEMs under the Radeon 600 series.…

Charging cable can hack your device

you plug a charging / lighting cable into your PC to transfer files. All seems totally…

Most dangerous spyware can steal data from iCloud, WhatsApp, Microsoft and Google’s server also

The pegasus spyware can steal all your contacts, call logs, images and videos, passwords, app data,…

Ad Blocker Leaks Data of Millions Chrome and Firefox Users

Newly conducted research by cybersecurity expert indicates that some ad blocker in Chrome and Firefox steals…

Instagram bug leads to hacking account

popular social media platform Instagram has a flaw which helps hackers to hack any Instagram account…

Malware Infected 25 Million Devices in India From Pre-Installed App

If you clicked on popular apps like WhatsApp, temple run, etc but still get advertisements then…

World’s deadliest PC:The Persistence of Chaos

Have you ever thought of the most lethal weapon in the world.This question if asked 25…

Flipboard Hacked Twice, User Information Leaked

Flipboard is a news aggregator and social aggregator company based in Palo Alto, California established since…

How to Protect Yourself from DJYU Ransomeware?

Recently, Tech Infinite talked with few users infected with a ransomware that is spreading in May…

Whatsapp Hack:How to protect yourself?

Recent reports of Whatsapp being hacked by spyware is making the rounds on Internet and is…

Justdial – 100 Million People Information Leakage!

Local search service Justdial faced a security breach that exposed personal information of over 100 million…

How to protect yourself from key logging?

Hello readers, How are you? Today in this article we are going to tell you about…

How to access the dark web?

Hello readers, So in an earlier article, we wrote a tutorial on how to surf anonymously…

How can passwords be stolen from websites [tutorial]?

Hello Readers, Probably you search on the web about stealing Facebook Passwords. We all have some…

Here’s what you need to know about cross-site scripting attack!

The creation of fraudulent websites has grown common today. The resemblance of these fake websites can…