Quantcast
Browsing all 6409 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Europol and banking federation warn consumers of cyber scams

Europol and the European Banking Federation have launched a new campaign designed to raise public awareness of growing incidents of financial fraud and data theft, as part of European Cyber Security...

View Article


Image may be NSFW.
Clik here to view.

Effect Of "Internet Of Things"& Artificial Intelligence On Elections And Others.

Effect Of "Internet Of Things"& Artificial Intelligence On Elections And Others.Latest technological advancements are beginning to become a point of worry for the election officials as the hackers...

View Article


Image may be NSFW.
Clik here to view.

Phishing attack stealing login details, pictures of iPhone users

A new phishing email attack has engulfed Apple users to steal their login information.The users are taken in the trap through a malicious email hyperlink labeled as ''review your subscription' which...

View Article

Image may be NSFW.
Clik here to view.

Russians and Vietnamese Hackers detained in the Czech Republic

The Prosecutor's office in Prague reported the detention of eight citizens of Russia and Vietnam. Hackers are accused of cyber attack on computer networks of the Czech Foreign Ministry.Hackers are...

View Article

Image may be NSFW.
Clik here to view.

Over-Hyped libssh vulnerability

A four-year-old vulnerability in libssh, a library used to implement the Secure Shell (SSH) authentication protocol, could allow malicious actors an easy access to servers with full administrative...

View Article


Image may be NSFW.
Clik here to view.

Password and Credit Card-Stealing Azorult Malware Updated: More Weaponized

Exponentially increasing the potency of the Azorult, its operators configured a new update for the malware which has been stealing passwords, bank card main points, and cryptocurrency since its...

View Article

Hackers in China are using Datper Trojan

A China-linked cyber espionage group known as Tick was observed using the Datper malware in a recent campaign, Cisco Talos security researchers reveal.Also referred to as Redbaldknight and Bronze...

View Article

Image may be NSFW.
Clik here to view.

Infamous North Korean Hacking Group Steals $571 Million in Cryptocurrency

The North Korean Hacking Group, Lazarus has managed once more to embezzle more than a billion dollars in cryptocurrency. The group has purportedly done such sorts of thefts since January 2017, amassing...

View Article


Image may be NSFW.
Clik here to view.

VLC and other media players hit by critical vulnerability

A critical code execution vulnerability has been identified in LIVE555 Streaming Media RTSP Server library used by VLC and other media players. Lilith Wyatt, the IT security researcher at Cisco Talos...

View Article


Image may be NSFW.
Clik here to view.

Healthcare.gov system hacked, data o 75,000 customers revealed

Hackers compromised the computer system that interacts with the HealthCare website, HealthCare.gov, used by insurance agents to directly enrol the customers for the insurance plan, said officials at...

View Article

Image may be NSFW.
Clik here to view.

Obscure 8 Year old Coding Glitch in jQuery Files!

Obscure jQuery File Coding Glitch That Existed For 8 Years!Out of the most well-known plugins of the jQuery framework, reportedly, one has subsisted for more than a couple of years in the oversight...

View Article

Image may be NSFW.
Clik here to view.

US government healthcare agency suffered a massive data breach

The U.S.  government’s healthcare insurance agency has sustained a massive data breach that allows hackers to pilfer personal information of around 75,000 customers.The  Centers for Medicare and...

View Article

Image may be NSFW.
Clik here to view.

McAfee Tech Support Scam Stealing Credit Card and Personal Information

With credit card criminals leveling up their genius, the numbers of credit card scams are bordering on ridiculous and the types of the same are distinctively threatening. Recently, a tech scam in the...

View Article


Image may be NSFW.
Clik here to view.

Elon Musk claims Twitter locked his account

Elon Musk has claimed on Tuesday that Twitter locked his account fearing it had been hacked following several bizarre posts about anime. Twitter apparently believed someone else was in control of Mr...

View Article

Image may be NSFW.
Clik here to view.

Russia responded to the US Justice Ministry's accusations of interference in...

On October 19, the U.S. Justice Department has accused a Russian woman Elena Husyainova of interference in the political system of the United States, specifically in midterm elections, which will take...

View Article


Image may be NSFW.
Clik here to view.

Microsoft, Netflix and PayPal Emerge As the Top Targets for Phishing Attacks

Email security provider Vade Secure released another phishing report following the 25 most 'spoofed' brands in North America that are imitated in phishing attacks. Amongst them the top three are...

View Article

Image may be NSFW.
Clik here to view.

Fake banking apps may have stolen data of thousands of customers

Fraudsters have lured users to download and use fake banking applications to steal their personal and sensitive data.The fake apps available on the Google Play store  promises customers some of the...

View Article


Image may be NSFW.
Clik here to view.

Microsoft zero-day exploit revealed on twitter

New Microsoft unpatched Zero-day bug exposed in online again along with proof-of-concept (PoC) by the same security researcher who has previously leaked another critical zero-day vulnerability on...

View Article

Image may be NSFW.
Clik here to view.

Article 0

Signal Desktop Allows Encrypted Data To Be Out In The OpenAn application that goes by the name of “Signal Desktop” has reportedly been accustomed to procedural mistakes that lead to the unveiling of...

View Article

Image may be NSFW.
Clik here to view.

New malware turning smartphones into hidden proxies

Cybercriminals are distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. The proxies can be used to circumvent internal network...

View Article
Browsing all 6409 articles
Browse latest View live