An IT security researcher reveals how a wheelchair's QR code becomes a master key to all comfort functions.
India's digital revolution has made life easier than ever, but it has also given rise to a sophisticated criminal ecosystem ...
The surge in attempts to compromise Microsoft 365 accounts has been enabled by readily available phishing tools.
Built with a people- and business-centred approach, the system is designed to serve as a bridge between enterprises and ...
A cybersecurity company has found a new method for taking over WhatsApp accounts that exploits the app's legal device-linking ...
And it’s a high stress time of year. The FBI said cyber-enabled fraud still dominates the scam landscape, accelerated by AI. In the first seven months of 2025, AI accounted for more than 9,000 ...
Hackers are tricking WhatsApp users into unknowingly entering a code that links the attacker's device to their account, ...
Face authentication is now officially recognized by UIDAI for Aadhaar verification, offering a secure, consent-driven online identity solution. This n ...
We use the term GhostPairing Attack because the victim is tricked into completing WhatsApp’s own device pairing flow, adding the attacker’s browser as an invisible extra device on their account. There ...
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
UAE-based Relik has closed a seed funding round with participation from KBW Ventures, Naatt Holding, Fort Holding, and ...
India’s updated Aadhaar rules formally recognise face authentication and strengthen user consent, improving digital identity security and enabling safer online verification across government and ...