Hackers News
-
Crypto Thieves Exploit Blockchain Bridges to Snatch $100Mn From Binance-linked network
Popular cryptocurrency exchange Binance was forced to temporarily halt operations due to an attack. The exchange has clarified that hackers discovered and exploited a loophole in its Smart Chain...
October 7, 2022 | Internet News -
Here’s How Hackers Are Exploiting New Vulnerabilities Within Minutes
Cyber attacks are at an all-time high, and hackers have become more efficient than ever. Attackers are capable of moving faster than anyone when speaking of scanning vulnerability announcements...
August 17, 2022 | Internet Features -
Apple, Meta Shared User Data With Hackers Over Fake Emergency Requests: All You Need To Know
Data privacy and protection are the need of the hour, and yet, we keep hearing instances where tech companies themselves share user data without consent. In the latest incident, Apple and Meta have...
April 3, 2022 | News -
Hackers Sending USB Stick With Malware As Gift: How Can You Stay Safe?
Hacking and data thefts have been on the rise for decades now. Being vigilant and alert is the best way to stay safe and protected today. But what would you do if you received a friendly-looking...
January 8, 2022 | News -
10 ways hackers steal money from your Debit/Credit card
The usage of online is rising as the day progress and one of the major fields that make good use of it is the Financial and Banking sector. Also, starting from paying bills, to mutual funds,...
February 22, 2018 | Internet Features -
BSNL launches protection of E-mail from hackers
State-run telecom operator Bharat Sanchar Nigam Limited ( BSNL) has announced its new offer in which the telco is offering protection of E-mail from hackers and accidental delete of emails. The...
January 9, 2018 | Telecom News -
Hackers use Dark Web to execute Ransomware-as-a-Service: McAfee
Truth be told, the world wide web is more vast than you think and the majority of us see only the surface of it. While such is the case, basically three segments of various scale represent the...
November 30, 2017 | Computer News -
'Ghost Telephonist' lets hackers access phone numbers
A group of Chinese researchers have demonstrated an "evil attack" called the "Ghost Telephonist" which allows hackers to take over phone numbers and gather call and message content. The...
July 31, 2017 | Mobile News -
How Android Nougat protects you from Ransomware
Ransomware being one of the oldest threat faced by desktop and notebook users have made a huge impact on few countries. Ransomware is a kind of malware which encrypts all the documents, media and...
March 30, 2017 | Mobile Features -
Security flaws in Whatsapp and Telegram patched immediately
If you are using Whatsapp Web or Telegram Web in your computer, then it's high time to safeguard yourself from hackers taking over your account. On Wednesday, a computer security firm Check Point...
March 16, 2017 | Apps News -
Here’s the most common password of 2016
According to a research conducted over 10 million passwords that were made public by data breaches '123456’ was the most common password of 2016. A US-based password management company...
January 16, 2017 | Internet News -
Understanding Ransomware
You have a beautiful daughter who attends school every day. One day, like every other day, she attends school, and on her way back home she gets abducted by two men. As a matter of fact, these two...
January 3, 2017 | Internet Features