Home News

News

Security Breach at Forever 21 Exposed Customer Credit Card Details

First notified in November of an information break occurrence, famous garments retailer Forever 21 has now affirmed that hackers stole credit card data from...

6 Russian Government Officials Involved in DNC Hack

The United States Department of Justice has purportedly gathered enough proof to charge no less than six Russian government authorities for supposedly assuming a...

DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys

DUHK (Don't Use Hard-coded Keys) is a vulnerability that affects devices using the ANSI X9.31 Random Number Generator (RNG) in conjunction with a hard-coded...

Wi-Fi security flaw: WPA2 Key Reinstallation Attack KRACK

Security scientists have found a few key administration vulnerabilities in the center of Wi-Fi Protected Access II (WPA2) protocol that could enable an malicious...

Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server

Viacom—the well known entertainment and media organization that claims Paramount Pictures, Comedy Central, MTV, and several different properties—has presented the keys to its kingdom...

CCleaner Malware Infects Big Tech Companies With Second Backdoor

The gathering of obscure programmers who captured CCleaner's download server to convey a noxious adaptation of the prominent framework improvement programming focused no less...

Ransomware Top Stories June 2017

Ransomware has risen by over 250 percent during the first few months of 2017, according to a report Monday by the security firm Kaspersky....

Unprotected AWS Server Exposed Around 14 Million Verizon’s Customer Data

Verizon, the major telecommunications provider, has suffered a data security breach with over 14 million US customers' personal details exposed on the Internet after...

Microsoft’s Latest Security Breach: How to Protect Your Accounts Against Hackers

Chinese hackers working for the company iGSKY have been sued by Microsoft for breaking into multiple Xbox accounts. Court documents detailing the incident reveal...

US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison

A US federal district court in Mississippi has sentenced such three Nigerian scammers to a collective 235 years in prison for their roles in...

Was North Korea Behind the Wannacry Ransomware?

Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?That's the subject of heated debate in cybersecurity circles after...

UK Seeks End-to-End Encrypted Communication

The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied. The government's desires are set...
- Advertisment -

Most Read

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...