Home News

News

Security Breach at Forever 21 Exposed Customer Credit Card Details

First notified in November of an information break occurrence, famous garments retailer Forever 21 has now affirmed that hackers stole credit card data from...

6 Russian Government Officials Involved in DNC Hack

The United States Department of Justice has purportedly gathered enough proof to charge no less than six Russian government authorities for supposedly assuming a...

DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys

DUHK (Don't Use Hard-coded Keys) is a vulnerability that affects devices using the ANSI X9.31 Random Number Generator (RNG) in conjunction with a hard-coded...

Wi-Fi security flaw: WPA2 Key Reinstallation Attack KRACK

Security scientists have found a few key administration vulnerabilities in the center of Wi-Fi Protected Access II (WPA2) protocol that could enable an malicious...

Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server

Viacom—the well known entertainment and media organization that claims Paramount Pictures, Comedy Central, MTV, and several different properties—has presented the keys to its kingdom...

CCleaner Malware Infects Big Tech Companies With Second Backdoor

The gathering of obscure programmers who captured CCleaner's download server to convey a noxious adaptation of the prominent framework improvement programming focused no less...

Ransomware Top Stories June 2017

Ransomware has risen by over 250 percent during the first few months of 2017, according to a report Monday by the security firm Kaspersky....

Unprotected AWS Server Exposed Around 14 Million Verizon’s Customer Data

Verizon, the major telecommunications provider, has suffered a data security breach with over 14 million US customers' personal details exposed on the Internet after...

Microsoft’s Latest Security Breach: How to Protect Your Accounts Against Hackers

Chinese hackers working for the company iGSKY have been sued by Microsoft for breaking into multiple Xbox accounts. Court documents detailing the incident reveal...

US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison

A US federal district court in Mississippi has sentenced such three Nigerian scammers to a collective 235 years in prison for their roles in...

Was North Korea Behind the Wannacry Ransomware?

Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?That's the subject of heated debate in cybersecurity circles after...

UK Seeks End-to-End Encrypted Communication

The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied. The government's desires are set...
- Advertisment -

Most Read

Top 10 things to Do After Installing Kali Linux

Kali Linux is considered to be one of the best hacking distribution of this era, it is developed by Offensive Security to give an...

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...