Looking at what happened in 2017, the Equifax breach, Ransomware WannaCry, Russian interference, phishing scams. Well, one has to be prepared for more in 2018. There will be bigger breaches,…
Read More
Looking at what happened in 2017, the Equifax breach, Ransomware WannaCry, Russian interference, phishing scams. Well, one has to be prepared for more in 2018. There will be bigger breaches,…
Read More
We, at HackerCombat, are positive-minded and optimistic on the main. We believe that as cyber security experts we can keep fighting all those cyber threats and attacks that keep happening….
Read More

As the New Year approaches you may be busy finding the best shopping website for that special deal that you always waited for, but are you doing that safely? Theoretically,…
Read More
Time for resolution as the New Year approaches, whether we plan for fitness to lose weight or spend quality time with friends and family. Nevertheless, one in ten people manage…
Read More
As 2018 approaches, the Internal Revenue Service (IRS) has called upon citizens in the U.S. to be alert and on the lookout for new highly-sophisticated email, likely to be a…
Read More
Cybersecurity is a practice that ensures that all the information, confidentiality and availability are intact and not compromised with. It depends on how you keep them safe and in case…
Read More
The year 2017 was quite exciting as we came across several new things from Ransomware to IoT malware and more. Several industries found themselves gripped at the mercy of the…
Read More
What is Tor? Tor is a free, open-source browser that functions using the onion routing process. Tor works on all kinds of internet protocols- HTTP, HTTPS, FTP, Gopher etc. The…
Read More
IRS has issued a warning to taxpayers and tax professionals about a phishing email scam that targets Hotmail users and steals their financial information. The fraud email comes with a…
Read More
Penetration testing is the process of testing a software by trained security experts (aka penetration testers or ethical hackers) in order to find out its security vulnerabilities. The objective of…
Read More