Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners. Dubbed ZeroFont, the technique involves inserting hidden words with a font size of zero within the actual content […]

Microsoft has already fixed the Wi-Fi attack vulnerability

Technology companies are starting to respond to a new Wi-Fi exploit affecting all modern Wi-Fi networks using WPA or WPA 2 encryption. The security vulnerabilities allow attackers to read Wi-Fi traffic between devices and wireless access points, and in some cases even modify it to inject malware into websites. Security researchers claim devices running macOS, Windows, iOS, […]

Recover Deleted WhatsApp Messages on Android Mobile

If you accidentally deleted WhatsApp chat history, messages and attachments on Android phones, like Samsung galaxy phones, LG phones, HTC, Lenovo, Motorola, you can get them back. In this article, we will show you different ways to recover deleted WhatsApp data. We will introduce how to get back your recover deleted WhatsApp messages or chat […]

Apple explains how Face ID learns from its mistakes

The probability that a random person in the population could look at your iPhone X and unlock it using Face ID is approximately 1 in 1,000,000 (versus 1 in 50,000 for Touch ID)…. The statistical probability is different for twins and siblings that look like you and among children under the age of 13, because their distinct facial features may not have fully developed. If you’re concerned about this, we recommend using a passcode to authenticate.

%d bloggers like this: