Home News

News

Security Breach at Forever 21 Exposed Customer Credit Card Details

First notified in November of an information break occurrence, famous garments retailer Forever 21 has now affirmed that hackers stole credit card data from...

6 Russian Government Officials Involved in DNC Hack

The United States Department of Justice has purportedly gathered enough proof to charge no less than six Russian government authorities for supposedly assuming a...

DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys

DUHK (Don't Use Hard-coded Keys) is a vulnerability that affects devices using the ANSI X9.31 Random Number Generator (RNG) in conjunction with a hard-coded...

Wi-Fi security flaw: WPA2 Key Reinstallation Attack KRACK

Security scientists have found a few key administration vulnerabilities in the center of Wi-Fi Protected Access II (WPA2) protocol that could enable an malicious...

Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server

Viacom—the well known entertainment and media organization that claims Paramount Pictures, Comedy Central, MTV, and several different properties—has presented the keys to its kingdom...

CCleaner Malware Infects Big Tech Companies With Second Backdoor

The gathering of obscure programmers who captured CCleaner's download server to convey a noxious adaptation of the prominent framework improvement programming focused no less...

Ransomware Top Stories June 2017

Ransomware has risen by over 250 percent during the first few months of 2017, according to a report Monday by the security firm Kaspersky....

Unprotected AWS Server Exposed Around 14 Million Verizon’s Customer Data

Verizon, the major telecommunications provider, has suffered a data security breach with over 14 million US customers' personal details exposed on the Internet after...

Microsoft’s Latest Security Breach: How to Protect Your Accounts Against Hackers

Chinese hackers working for the company iGSKY have been sued by Microsoft for breaking into multiple Xbox accounts. Court documents detailing the incident reveal...

US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison

A US federal district court in Mississippi has sentenced such three Nigerian scammers to a collective 235 years in prison for their roles in...

Was North Korea Behind the Wannacry Ransomware?

Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?That's the subject of heated debate in cybersecurity circles after...

UK Seeks End-to-End Encrypted Communication

The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied. The government's desires are set...
- Advertisment -

Most Read

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...