Huge amount of Instagram records has been exposed by Anurag sen a security researcher. Instagram was so far clueless on how this unsecured profile ended up online. The Instagram data included user bios, profile pictures, followers’ numbers and location. This information is viewable online. According to online tech publishing firm, which incidentally, broke the story....Continue Reading
The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...Continue Reading
It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...Continue Reading
“Weaponization” of Social Media How are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone is a giant tactical weapon of the new cyber tacticians that seek out advantage from the digital information era. According to New York Times...Continue Reading
Another one? It is as if the Cambridge Analytica, and the previous Facebook bug or vulnerability was not enough of a problem for the Social Media giant. Facebook now faces another controversy where it had exposed its latest security breach. What was the security breach? Who were affected? The security breach where the platform accidentally...Continue Reading
In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices. In...Continue Reading
What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners...Continue Reading
Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...Continue Reading
A popular trend in the mobile app market that recently suffered a data breach is involving fitness apps. Nike Plus, Strava, adidas miCoach and a slew of other apps have been developed to better track the fitness regiments of people globally. Polar, another popular fitness app, tried to up the ante by adding a feature...Continue Reading
One of the largest hosting companies in Germany, DomainFactory, has been penetrated by hackers. The hosting company, owned by GoDaddy since 2016, reported that the data breach happened around late January 2018, but the company found out about the incident just last week, July 3rd, after the alleged Hacker began sharing bits of the stolen...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.