Author Details

Google Removes 85 Adware Infected Android Apps 1

Google has removed 85 Android apps from the official Play Store after it was reported that these apps were...

Read More
The 9 Cybersecurity Practices All Firms Should Follow in 2019

This new year, organizations and their employees from the CEO to the humble clerk, as well as individual computer...

Read More
London Blue Cybergang List 50000 execs for Phishing Attacks

All throughout 2018, cybersecurity has made headlines around the world. After a devastating wave of ransomware attacks, it is...

Read More
The WhatsApp Gold Scam is Back in a New Form

The WhatsApp Gold scam, which first appeared in 2016, has now resurfaced in a new form, posing a big...

Read More
Obfuscation of Source Code of Phishing Messages

Threat actors want to maintain anonymity in their operations, especially in the art of virus development and phishing expedition....

Read More
New USB C Technology for Better Protection Against Malware

USB type-C ports and connectors are slowly but surely picking-up popularity, as it replaces USB-A and Micro-USB due to...

Read More
Data Resolution LLC Battles Ryuk Ransomware Attack

On August 24, 2018, column, we have reported here in Hackercombat.com the rise of Ryuk ransomware, allegedly created by...

Read More
2

As part of its expansion to the space of cryptocurrency, torrent client BitTorrent will be introducing its own native...

Read More
Hc1

Two hackers have teamed up with Felix “PewDiePie” Kjellberg and forcing TVs to display a message asking people to...

Read More
New Project 10

The tendency for companies to adopt consumer technologies (also known as commoditization) is increasing rapidly and that means a...

Read More

Page 44 of 97

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register