Source: pcmag.com

Report: Google Dragonfly Links Phone Numbers to Search Results - Cyber security news

Report: Google Dragonfly Links Phone Numbers to Search Results

US Lawmakers: AI-Generated Fake Videos May Be a Security Threat - Cyber security news

US Lawmakers: AI-Generated Fake Videos May Be a Security Threat

Google's AI Hate Speech Detection Tricked by Typos - Cyber security news

Google's AI Hate Speech Detection Tricked by Typos

FTC Seizes Army.com, Other Phony Military Recruitment Sites - Cyber security news

FTC Seizes Army.com, Other Phony Military Recruitment Sites

As DARPA Turns 60, What's Next? - Cyber security news

As DARPA Turns 60, What's Next?

Firefox to Block Ad Trackers by Default - Cyber security news

Firefox to Block Ad Trackers by Default

Tumblr Bans Hate Speech, Glorification of Mass Shootings - Cyber security news

Tumblr Bans Hate Speech, Glorification of Mass Shootings

Apple: Facebook's Onavo VPN Violates App Store Rules - Cyber security news

Apple: Facebook's Onavo VPN Violates App Store Rules

Hackers Use Android Porn App to Circulate Powerful Spyware - Cyber security news

Hackers Use Android Porn App to Circulate Powerful Spyware

Google Launches Searchable Database on US Political Ads - Cyber security news

Google Launches Searchable Database on US Political Ads

Over The Next Five Years, 146 Billion Records Will be Breached - Cyber security news

Over The Next Five Years, 146 Billion Records Will be Breached

How to Get Google to Quit Tracking You - Cyber security news

How to Get Google to Quit Tracking You

US Government Agencies Can't Buy Huawei or ZTE Products Anymore - Cyber security news

US Government Agencies Can't Buy Huawei or ZTE Products Anymore

Beware of Short-Distance Crypto Data Leaks - Cyber security news

Beware of Short-Distance Crypto Data Leaks

Meltdown Researchers Call for More Secure CPUs - Cyber security news

Meltdown Researchers Call for More Secure CPUs

Cracking Voice Authentication for Fun and Profit - Cyber security news

Cracking Voice Authentication for Fun and Profit