Pro-Palestine activists Hacked Ha’aretz Newspaper’s Twitter Account and Posted: “Our martyrs’ mothers will drink your soldier’s blood.” The Twitter feed of Israeli...
Researchers at Lookout Security have found a Shuanet malware that masquerades as some of the most downloaded apps like Facebook, Twitter, and...
A software development kit that has been provided by Baidu (A Chinese search engine) can easily be exploited for installing backdoors on...
Short Bytes: What is the worst thing that could happen when you hire a hacker to conduct some criminal activity? Yes, police...
Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was...
A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...
A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s...
The online hacktivist Anonymous is planning to leak personal information of around 1000 members of the white supremacist Christian organization the Ku Klux Klan...
Short Bytes: A 15-year-old has been arrested in Northern Ireland in connection with the cyber-attack on the TalkTalk’s website. This news of 15-year-old...
Short Bytes: With the ever advancing fast-paced technology, we are now more open to the more intimate devices like wearables. They are...
TalkTalk (UK’s largest broadband and mobile phones service provider) has possibly faced one of the biggest breaches in the history of cyber...
Short Bytes: A hacker that operates a Twitter handle named Amped Attacks, is taking down the websites spreading homophobia and racism one...
The CIA boss John Brennan had his AOL-based email account hacked earlier this week by pro-Palestinian hackers — Now WikiLeaks has leaked some...
Short Bytes: A security researchers from the Pen Testers Partners has revealed that the smart iKettles in your homes are very “insecure.”...
Short Bytes: An incident of hacking into the school computer systems and changing the subject grades has been spotted in a New...
Short Bytes: According to the latest revelations made by the American law enforcement agencies, ISIS terrorists are failing hard at hacking the...
Short Bytes: In the third article of the “Steps to Effective Security” series, I’ll tell you 10 steps to defeat hacking attacks and...
Short Bytes: The Chinese government has taken an unprecedented step to comply with a U.S. request and arrest some hackers suspected of hacking...
Matthew Keys with his attorneys outside Federal Court in Sacramento. He was found guilty in the hacking case against L.A.Times and Tribune...
The post includes a detailed procedure to hack and decrypt WhatsApp Database remotely on rooted Android mobile devices. Very Interesting!. A few...
Short Bytes: Increasing data breaches have made the personal identifiable information (PII) market very hot. The latest report outlines the different aspects...