27.8 C
Mumbai
Friday, August 7, 2020
Tel: 8850717892
Tags Hacker news

Tag: hacker news

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks....

BlackRock Trojan Targets Android Apps To Steal Credentials

Android applications are seen to be most vulnerable to cyber-attacks. Moreover, the rise in operations of applications for the last three months has given...

Emotet Botnet Returns With Malicious Phishing Campaign

The botnet strategy of threat actors to infect systems in bulk is rampant. Moreover, the degree of severity is also soaring with every botnet...

“Blur” Photo Campaign Targets Android Users

Recently, Google Play Store was found with 29 malicious photo editing apps with a combined 3.5 million downloads running out-of-context ad campaigns. This is...

Phorpiex Botnet Uses Sextortion Emails To Generate Revenue

The experts and researchers in the domain of cybersecurity have seen an upsurge in ransomware attacks. And every time it’s more lethal than the...

Jackpotting Attack: Making ATM Machines Spit All Cash

ATM jackpotting, a technique to tamper with the machines to spit all cash inside, is becoming a vogue among criminals. ATM machines are enticing targets...

Mirai New Variant Targets IoT Devices For Botnet Strategy

IoT devices have made lives easier by providing a variety of services through a range of innovative devices. But being connected to a network,...

Endpoint Security: Defined, Explained and Explored

Cyber threats and security breaches are increasing rapidly with time. Information theft, brazen attacks and system compromise are familiar adversaries for organisations and companies...

Twitter Hacked: Biggest Attack In The History Of Social Media

On Wednesday, the tech giant Twitter witnessed the greatest cyber attack in the history of social media. To add to the extremity of the...

“Undeletable” Adware Hits Android Users

Adware or advertising-supported software is used by developers to generate revenue by launching on-screen ads. Adware is usually accompanied by other malware scripts to...

Try2Cry “Stupid” Ransomware

Ransomware attacks are unprecedentedly rising during COVID times. The increase in such attacks is rampant and involves advanced and highly notorious techniques. But all...

EvilQuest macOS Ransomware: A Smokescreen for Other Threats

The COVID-19 crisis has witnessed ample of cyberattacks. Ransomware is the most rampant threat organisations, and individuals are facing worldwide. This time threat actors...

Promethium: A “state-backed” APT Targets India

India is among the top five countries being targeted online. Most of the attacks stem from China, Russia, Pakistan, Ukraine, Vietnam and North Korea....

India Govt. bans 59 Chinese Applications including TikTok

Chinese tech giants have seen numerous allegations regarding how they store users’ data they collect. This week the Indian Government banned 59 Chinese smartphone...

Cyber Security Tips for Retailers and Consumers

The holiday season has arrived, and it is high time that consumers and retailers make arrangements for staying one step ahead of the prevalent...

Securing Your Web CMS: Best Practices to Follow

The internet has become more of a necessity for today's people as they can find varied information quickly here. And because of this demand,...

New Era of Computer Forensics

This new branch of digital forensic deals with computer crime and computer supported criminal activities. There are many computer crime investigations conducted during the...

5 Ways to Make Your Website Hack-Proof

Did you know that Google identifies around 10,000 malware-infected sites, out of which almost half of them are the ones compromised by hackers? Although...

Avoid Facebook Phishing Schemes

Over the past few months I have noticed a large increase in the number of Facebook accounts getting hacked or hijacked by hackers using...
- Advertisment -

Most Read

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the...

7 Innovative Structures made from Recycled materials

Sustainability design has a wide spectrum of applicability. Beyond the typical materials like plastic and glass that are widely recycled and are getting used,...

COVID-19 & It’s Huge Impact on Real Estate Markets

An Overview: We are undoubtedly entering an era of profound change in how we work, learn, live and socialise with COVID-19. Developments are incredibly fluid,...

FORMULA ONE 2020

INTRODUCTION:- FORMULA ONE 2020 is a racing type of video game played in first person or third person view which can be played in Single-player...