Category : Security

Thousands of Coinbase Wallets Drained by Hackers

Thousands of Coinbase Wallets Drained by Hackers

Coinbase, the cryptocurrency platform used to buy Bitcoin, Ethereum, and other coins, suffered a hack that affected 6,000 users, leaking their account...

Massive Twitch Data Breach Reveals Source Code - What You Need to Know [Updated]

Massive Twitch Data Breach Reveals Source Code - What You Need to Know [Updated]

Updated with additional information from Twitch.Twitch, a streaming and chat platform used by millions of online gamers and owned by Amazon, appears t...

Exclusive: Maximus Answer DualCam Video How safe is the doorbell?

Exclusive: Maximus Answer DualCam Video How safe is the doorbell?

Maximus Answer DualCam is one of the best video doorbells available. But while DualCam may be great at protecting packages, how good is it at protecti...

Yubico's new fingerprint security key can prevent it from being hacked - and I just tried it

Yubico's new fingerprint security key can prevent it from being hacked - and I just tried it

Yubico introduced its newest and most expensive hardware security key this week.The YubiKey Bio is available in USB-A ($80) and USB-C ($85) for optima...

Apple Fixed Zero-day iPhone flaw with iOS15.0.2 - Update Now

Apple Fixed Zero-day iPhone flaw with iOS15.0.2 - Update Now

Are you an iPhone or iPad user? Then you should update your device now, there is a new zero-day vulnerability affecting iPhones and iPads, and Apple h...

Apple: App sideloading on iPhone would "undermine" security protections

Apple: App sideloading on iPhone would "undermine" security protections

Allowing iPhone users to sideload iOS apps from sources other than the App Store is a disaster for iPhone security, Apple asserts in a "threat analysi...

Wireless carrier Visible denies any data breach as the account takeover continues

Wireless carrier Visible denies any data breach as the account takeover continues

Some customers of Verizon-owned Visible Wireless Services are learning hard lessons about reused passwords and how they can lead to compromised accoun...