Category

Cyber Criminals
Iranian Hackers Stormed Citrix
Citrix has now disclosed a massive data leak by informing their customers that hackers intruded their network and stole their corporate secrets.   Affected Customers Citrix services the following businesses but not limited to: US Military Various US Government Agencies Whitehouse FBI With the above government entities itself, this data leak proves to be critical....
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel
Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...
Continue Reading
data breach cost
With our developing reliance on innovation, huge data breaches are more typical than any time in recent history. Between January 2005 and today, there have been more than 9000 breaks with more than 1.1 billion records uncovered, as per the ID Theft Resource Center. The biggest information breach in history was a hack on 500...
Continue Reading
phishing assaults
November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From...
Continue Reading
Marriott Database Leak
Marriott Database Leak: Where will the data go? Following up with the recent Marriott Database Leak which has been said to be state sponsored by a rival state of USA, the leak is severe and could have contained details that are vital which may have included credit card details. In case the hackers behind the...
Continue Reading
torrent clients
TORRENTING: You could be helping hackers – and you don’t know it Every time you use your torrent client, you take a gamble. It doesn’t matter if it’s the usual chance of running in with some copyright organization; the web traffic using your torrent client is rarely 100% legal. But with technological advancements and research...
Continue Reading
Huge Data Breach Uncovers Industry Secrets
Cyber Attacks are getting more and more frequent nowadays. From government institutions to hospitals, banks and other financial institutions. There’s almost no rest for cyber criminals and the amount of illegal activities they couldn’t accomplish. And their newest victim – The Auto Industry. Car manufacturers, or all manufacturers in general – normally go to great...
Continue Reading
Cyber Hacking in Singapore’s Healthcare Systems
Cyber attackers have just stolen a whole bunch of personal and patient data in a record-breaking hack which occurred Friday, July 20th. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals (SingHealth) and other healthcare institutions. More than 1 Million patient’s personal records have...
Continue Reading
Money Laundering via Mobile Gaming
For anyone who has played many of the popular smartphone games will definitely agree, the need for in-game currency is essential. Most of the players are hooked upon the notion that in order to advance substantially in the game is to use or purchase their currency. Smartphone gamers often rely but get frustrated with the...
Continue Reading
Google Images Plagued by Malwares
Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malwares. It’s as if regular hacking of websites and servers is not enough, these criminals are now targeting legit hosted websites and its images, and using them as a tool to exploit vulnerabilities while remaining undetected. What’s even...
Continue Reading
1 2 3