Home News

News

Security Breach at Forever 21 Exposed Customer Credit Card Details

First notified in November of an information break occurrence, famous garments retailer Forever 21 has now affirmed that hackers stole credit card data from...

6 Russian Government Officials Involved in DNC Hack

The United States Department of Justice has purportedly gathered enough proof to charge no less than six Russian government authorities for supposedly assuming a...

DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys

DUHK (Don't Use Hard-coded Keys) is a vulnerability that affects devices using the ANSI X9.31 Random Number Generator (RNG) in conjunction with a hard-coded...

Wi-Fi security flaw: WPA2 Key Reinstallation Attack KRACK

Security scientists have found a few key administration vulnerabilities in the center of Wi-Fi Protected Access II (WPA2) protocol that could enable an malicious...

Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server

Viacom—the well known entertainment and media organization that claims Paramount Pictures, Comedy Central, MTV, and several different properties—has presented the keys to its kingdom...

CCleaner Malware Infects Big Tech Companies With Second Backdoor

The gathering of obscure programmers who captured CCleaner's download server to convey a noxious adaptation of the prominent framework improvement programming focused no less...

Ransomware Top Stories June 2017

Ransomware has risen by over 250 percent during the first few months of 2017, according to a report Monday by the security firm Kaspersky....

Unprotected AWS Server Exposed Around 14 Million Verizon’s Customer Data

Verizon, the major telecommunications provider, has suffered a data security breach with over 14 million US customers' personal details exposed on the Internet after...

Microsoft’s Latest Security Breach: How to Protect Your Accounts Against Hackers

Chinese hackers working for the company iGSKY have been sued by Microsoft for breaking into multiple Xbox accounts. Court documents detailing the incident reveal...

US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison

A US federal district court in Mississippi has sentenced such three Nigerian scammers to a collective 235 years in prison for their roles in...

Was North Korea Behind the Wannacry Ransomware?

Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?That's the subject of heated debate in cybersecurity circles after...

UK Seeks End-to-End Encrypted Communication

The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied. The government's desires are set...
- Advertisment -

Most Read

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.