Login Register

Hacking&Security news

china.jpg
Phishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted systems. Though hacking someone with phishing attacks was easy a decade ago, the evolution of threat detection technologies and cyber awareness among people has slowed down the success of phishing and social engineering attacks over the years. Since … read more
By Alex Nimoy - Oct. 2, 2019, 10:11 a.m.
29723649810_8cb4a06489_b_cyber-attack-800x600.jpg
The Canadian cybersecurity team gave the malicious threat that targeted Tibetan users via what’s app name the Poison Carp. According to the Canadian cybersecurity team from the University of Toronto’s Citizen Lab, the hacking group sent vicious web links to target users over the social media platform application called WhatsApp. The target users when received the link from the hacking … read more
By Alex Nimoy - Sept. 26, 2019, 10:31 a.m.
rsk.jpg
The technology Blockchain is changing the world. Sectors as diverse as government, agriculture, medicine, and education and of course the finances are being affected by this technology. And one of the pillars of this transformation is the contracts with smart, as the RSK. In simple terms, a contract for intelligent or “Smart Contract” is a contract of automatic execution. That … read more
By Alex Nimoy - Oct. 2, 2019, 11:53 a.m.
RAT.jpg
A RAT, remote-access trojan, is a type of malware that includes a backdoor, giving intruders the ability to control the targeted computer remotely and enabling them to perform any number of tasks, such as logging keystrokes, accessing confidential information, activating the system’s webcam, taking screenshots, formatting drives, and more. They can also be designed to spread to other systems on … read more
By Alex Nimoy - Sept. 15, 2019, 12:14 p.m.
And.png
Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android. What's more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of their … read more
By Alex Nimoy - Oct. 4, 2019, 12:21 p.m.
Signal_Blue_Icon.png
Almost every application contains security vulnerabilities, some of which you may find today, but others would remain invisible until someone else finds and exploits them—which is the harsh reality of cybersecurity and its current state. And when we say this, Signal Private Messenger—promoted as one of the most secure messengers in the world—isn't any exception. Google Project Zero researcher Natalie … read more
By Alex Nimoy - Oct. 4, 2019, 12:31 p.m.
government-data-leaks.jpg
There has been no shortage of massive security breaches so far this year. Just last July, Capital One disclosed that it was hit by a breach that affected more than 100 million customers. Also recently, researchers came across an unsecured cloud server that contained the names, phone numbers, and financial information of virtually all citizens of Ecuador – around 20 … read more
By Alex Nimoy - Oct. 9, 2019, 5:07 p.m.