Home scsec
Written by
82 Articles18 Comments
News

New iOS Update Resolves USB Exploit Linked to Targeted Attacks

Apple has announced a critical security update for iPhones and iPads in response to a severe vulnerability affecting the USB Restricted Mode, tracked...

News

IMF Forces El Salvador to Ditch Bitcoin as Legal Tender

El Salvador, the first country to adopt Bitcoin as legal tender in 2021, has reversed this decision following pressure from the International Monetary...

News

UK Government Demands Global Access to Apple Users’ Encrypted Data

Apple has reportedly been ordered by the UK government to create a backdoor allowing security officials access to users’ encrypted iCloud backups, impacting...

News

Malicious Apps on Google Play and Apple App Store Targeting Crypto Wallets

Recent findings reveal that several Android and iOS apps on the Google Play Store and Apple App Store have been found to contain...

News

Meta Confirms Zero-Click Spyware Attack on WhatsApp Targeting 90 Journalists and Activists

Meta has confirmed a disruption of a zero-click spyware campaign targeting approximately 90 journalists and civil society members via WhatsApp. The spyware, linked...

Tech

How to Make Your VPN Undetectable and Minimize the Risk of Being Blocked

Using a VPN (Virtual Private Network) can enhance your online privacy and security. However, some networks and services actively block VPN traffic. Here...

News

Two Arrested in Takedown of Nulled and Cracked Hacking Forums

Law enforcement has arrested two individuals and charged one alleged administrator in a crackdown on the notorious cybercrime forums Nulled and Cracked. The...

News

US and Dutch Authorities Disrupt Pakistani Hacking Network

On January 31, 2025, US and Dutch authorities announced the disruption of a Pakistani-based network of illicit online marketplaces led by hacker Saim...

Crypto

Top 10 Stablecoins by Market Share

Here’s the complete list of the top 10 stablecoins by market share, including their country of origin, launch year, benefits, disadvantages, and official...

Security

Quick easy routine that can prevent phone exploit

We all hear and read often on how phones get compromised and how hard it is to secure phones on which people have...