Thursday, September 24, 2020
Tags Hacking

Tag: Hacking

386M Databases From 18 Companies Stolen

A hacker/hacking group known as ShinyHunters flooded a hacker forum with 386 million user records stolen from 18 companies. According to BleepingComputer, ShinyHunters last week...

This Hacker Group is Selling User Data From 10 Firms For INR 13.6 Lakh Approx

A hacker group is selling data of 10 companies including online dating app Zoosk, US newspaper Star Tribune and food delivery service Chef that...

Now, Hackers Targetting People With Links To Fake Zoom HR, Payroll Discussion Video Meetings

Cybersecurity researchers at UK-based Sophos on Tuesday revealed hackers are now targeting people across the world with sending emailed with links to fake Zoom...

Facebook invests in Automation To identify and Address Cyber Breaches

Facebook has reportedly shaken up its cybersecurity team as it invests in automation to identify and address cyber breaches on its various platforms, resulting...

Agent Tesla Malware Being Delivered Through Hacking Scams, Exploiting MS Office Vulnerablilities

As coronavirus-related hacking scams gain steam, Pune-based Quick Heal Security Labs on Wednesday said it has observed Agent Tesla malware being delivered through such...

New Regulation Policies Emerge To Safeguard Businesses From Hackers

As cybercriminals pose new challenges to legitimate businesses, countries across the world will see increased regulation on a variety of topics from a variety...

Video Meeting App Zoom Prone to Hacking: Report

Slammed for the lack of users privacy and security by the US Federal Bureau of Investigation (FBI) and cybersecurity experts, video meeting app Zoom...

Majority of Smartphone Apps Contain “Backdoor Secrets” Which Allow Hackers To Access Private Data

Cybersecurity researchers have discovered that a large number of mobile phone applications contain hardcoded 'backdoor secrets' allowing hackers to access private data or block...

Cyber-Threats increase Amidst “Work From Home” Trend Due To Novel Coronavirus

With companies across the globe turning to work from home, via the online medium amid the COVID-19 outbreak, threats to cyber security have increased. Deepak...

Hacker Obtains Source Files For Xbox Series X Graphics

US-based semiconductor company AMD claimed that a hacker has obtained source files for some of its current and future GPUs, including details about the...

Hackers Take Advantage Amidst Coronavirus Outbreak By Using “Special Hacking Services” on Dark Net

Even as the spread of coronavirus hit businesses across the world, hackers are taking advantage of the situation by offering their "goods" at discounted...

While Companies implement “Work From Home” For Employees Amidst COVID-19 Fears, Hackers Try To Break Companies’ Networks

With several Indian organisations implementing work from home for employees in the wake of growing COVID-19 threat, hackers have turned their eyes on breaking...

Cybercriminals Exploit Public Fear of Uprising Novel Coronavirus Pandemic Through Malware

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the disguise of content coming from the Centers...

Here’s Why You Should Be Cautious While Setting Pins on Your Smartphone Device or You Can Get Hacked Anytime

 If your iPhone or Android smartphone PIN starts with 1234, 0000, 2580, 123456 or 654321, you are in a soup as these PINs are...

More Than 1 Billion Android Devices Vulnerable to Hackers: Report

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by...

Hackers Use Hidden Mobile Apps, Third party login To Target Consumers: Report

Hackers are using hidden mobile apps, third-party login and counterfeit gaming videos to target consumers via their personal devices and such apps resulted in...

Cyber Attackers May Use Ultrasonic Waves To Activate Siri, Google on Your Smartphone

Ultrasonic waves do not make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or...

Vulnerability in 4G May Help Hackers To Impersonate You: Researchers

Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users, take a streaming service subscription...

New Malware Can Fake Incoming Calls to Steal Banking Details: Kaspersky

Researchers at cybersecurity firm Kaspersky have identified a new version of the Ginp banking Trojan that can insert fake text messages into the Inbox...

Iranian Hackers Breach VPN Servers to Gain Network Access of Several Firms Globally

Cybersecurity researchers have spotted a widespread hacking by Iranian groups who compromised VPN (virtual private network) servers, planted bugs or 'backdoors' and succeeded in...

Most Read

People Avoid Masks Due to Breathing Problems: Study

When it came to non-compliance towards covering the face, breathing problems have emerged as a key reason, with 50 percent listing it in a...

Women More Vulnerable to Uncurbed Diabetes

Traditionally, women play the role of caregivers in India when it comes to families and their health. They prioritize the health of their loved...

Australia Rescuing Helpless Beached Whales

Rescuers of Australia are trying to save scores of beached whales on the shore in the state of Tasmania. Earlier this week, a pod...

Hydroponic Farm Method Making its way in India

The rows of lettuce, microgreens, and herbs that Himanshu Aggarwal and his mother grow in an enclosed room in a busy New Delhi market...