IT Digest: Office for iPad, MS-DOS and Word source code now available
This week on tech, Microsoft brings Office for iPad, a collection of…
Cloudflare Introduces User Friendly CAPTCHA Alternative Called Turnstile
CDN provider Cloudflare has introduced a user-friendly CAPTCHA alternative called Turnstile. The…
The best authenticator apps for Android, iOS, Windows, and macOS
If you use two-factor authentication with one-time codes generated in an app,…
Echobot malware is a smorgasbord of vulnerabilities
Security researchers spot new Mirai variant called Echobot that targets a wide…
Edit page in the browser in real time
is not necessary to go into the source code of the page…
How to Hiding from surveillance in the browser
BrowserPrivacy Badger is a browser extension that prevents advertisers and third-party trackers…
OWASP mobile top 10 security risks explained with real world examples
As mobile application developers we should be familiar with possible security risks…
Three ways to rob an ATM: Remote, almost remote, and physical
You might’ve noticed that we are fond of theft by ATM. No,…
XcodeGhost malware compromises legitimate iOS apps
A worm was found in the safe garden of Apple. About 40…
Banking Trojans: mobile’s major cyberthreat
We are still in the midst of the smartphone boom. Over the…