All the four consumer internet platforms say they immediately fixed the flaws once they were notifiedThe security flaws have exposed personal data of at least 200 million customers
3 min read17 Nov 2019Israeli cyber security firm Check Point Software Technologies has found three flaws in the app that hackers could exploit to manipulate messages and influence online conversations
1 min read8 Aug 2019Intel says a potential way to exploit the chip-related vulnerability would be to try to access information via code run inside a web browser
1 min read22 May 2018Cybersecurity firm CTS Labs said it found 13 critical security vulnerabilities and manufacturer backdoors in AMD's EPYC, Ryzen, Ryzen Pro and Ryzen Mobile lines of processors
1 min read13 Mar 2018The chip industry is still reeling from Jann Horn's findings, and processors will be designed differently from now on
6 min read17 Jan 2018The vulnerabilities, known as Meltdown and Spectre, can allow passwords and other sensitive data on chips to be read
2 min read12 Jan 2018One of the bugs is specific to Intel but another affects laptops, desktop computers, smartphones, tablets and internet servers alike
3 min read9 Jan 2018Apple said recent software updates for iPads, iPhones, iPod touches, Mac desktops and laptops, and the Apple TV set-top-box mitigate the chip security flaws known as Meltdown
1 min read5 Jan 2018Ransomware hackers exploited a security hole in some Windows versions discovered by the NSA, hence Microsoft says the intelligence agency bears some responsibility
3 min read16 May 2017Although FBI paid more than $1.3 mn, it didn't purchase the rights to the technical details, thus doesn't have the necessary information to submit the method
1 min read28 Apr 2016The Union Budget contains details about the estimated receipts and the expenditure of the government for a particular fiscal year. The Budget is allotted for the upcoming fiscal year, which runs from 1st April to 31st March of the next year. Here is a quick guide on how the Union Budget is prepared