Security

Android Security
A Closer Look At Simple Signs That A Is Possibly Smartphone Is Infected

A Closer Look At Simple Signs That A Is Possibly Smartphone Is Infected

In a previous article we wrote here in Hackercombat.com, we have emphasized the need to change user’s perception regarding smartphones. It is not just a phone, but rather the ‘personal…

Read More
virus removal for android

A Closer Look At Practical Virus Removal For Android

Google Android is a widely used operating system for mobile devices, in fact, it has even surpassed Microsoft Windows as the most used operating system across all computing devices. What…

Read More
Malicious ‘Beauty Camera’ Apps that Steal Personal Pictures

Malicious ‘Beauty Camera’ Apps that Steal Personal Pictures

At least 4 million Android users have reportedly got their devices infected with malicious beauty camera apps that are downloaded from Google play and which could steal personal pictures. Security…

Read More
First 5 Things To Do After Activating A New Android Device

First 5 Things To Do After Activating A New Android Device

Our mobile devices contain a lot of personal information, even more than on our computers. We go all day with our mobile phone, we can not leave home without it,…

Read More
How To Install Kali Linux In Android

How To Install Kali Linux In Android

Android is known as the Linux kernel-based operating system that took the mobile computing segment by storm since 2008. Although it is running on top of a Linux kernel, it…

Read More
GDPR
Australian Banks Security Breach as Revealed by a Freedom of Information Request

Australian Banks Security Breach, as Revealed by a Freedom of Information Request

Not all countries in the world have a Freedom of Information Law, however, for those that have, it is highly recommended to the citizens to take advantage of it. There…

Read More
Human Error The Reason behind 88 of all UK Data Breaches

Human Error: The Reason behind 88% of all UK Data Breaches

Cybersecurity news media are very active with these days, telling the story of doom and gloom everywhere. However, there is a considerable possibility that cybersecurity issues were not due to…

Read More
Google Locks Down Corporate Data as Employees use USB Security Dongle

Worldwide IT Security Spending to Hit $114bn This Year: Gartner Forecast

According to the latest forecast from Gartner, global IT security spending would hit $114 billion in 2018, which would mean an increase of over 12.4 percent from the 2017 figures….

Read More
New Money Making Scheme for Cybercriminals

New Money Making Scheme: After Ransomware Comes GDPR Extortion

The world has changed for the better when it comes to security and privacy of data, thanks to the European Union’s GDPR (General Data Protection Regulation). Companies, especially those operating…

Read More
DDoS
How To Choose The Best DDoS Protection Service

How To Choose The Best DDoS Protection Service?

Anti DDoS service companies have become a surprise sunshine industry for at least the last five years. This business, which made Cloudflare a household name enables websites to be more…

Read More
New Botnet That Targets Cloud Servers for DDoS Attacks

New Botnet That Targets Cloud Servers for DDoS Attacks

Bad news for those who use Hadoop for data analytics…there’s a new botnet out there that’s targeting Hadoop clusters seeking to perform DDoS attacks. (Hadoop, which is an open source…

Read More
Due to Misconfigured Component DemonBot Malware Infects Multiple Apache Hadoop Servers

Due to Misconfigured Component: DemonBot Malware Infects Multiple Apache Hadoop Servers

DDoS (Denial of Service Attack) malware have been wreaking havoc to online services on a fairly regular basis these days. Since last month, some Apache Hadoop servers have been observed…

Read More
DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV

DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV

Cybercriminals have unleashed a set of DDoS attacks on some prominent gaming companies, including the creators Assassin’s Creed and Final Fantasy XIV. SC Media reports, “A set of DDoS attacks…

Read More
Cloud Services Used as Hosts for DDoS Attacks

Cloud Services, Used as Hosts for DDoS Attacks

DDoS (Distributed Denial of Service Attack) continues to wreak havoc in various companies, services, and systems worldwide. It becomes more intense as the botnet creation, maintenance becomes cheaper through the…

Read More
Infographics
Used Data Storage Devices Have Security Flaws 1

Data Loss Prevention And Statistics [Infographic]

IT professionals are concerned about ransomware, malware and mobility (BYOD policies), this is according to recent survey. Find out more about what they think on hacker combat. Related Blog: A…

Read More
All Security News
toyota

Toyota Discloses Data Breach Impacting Source Code

Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third parties access to some 300,000 customer email addresses. According to…

Read More
700000 Snail Mails Sent to Victims Of The 2018 Zbot Trojan Virus min

A critical vulnerability in vm2 Allow a Remote Attacker to Escape The Sandbox

Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted code within a single process. Security researchers at Oxeye found…

Read More
Hostinger Resets User Passwords after data breach

123K Individuals Data Exposed in Tucson Data Breach

The Tucson Data Breach is a recent data breach that occurred in the city of Tucson, Arizona. The breach affected approximately 1.2 million individuals, who had their personal information exposed….

Read More
Open EDR
samsung

Samsung Sued Over Recent Data Breaches

Two Samsung customers, who are being represented by Clarkson Law Firm, have launched a class action lawsuit against the electronics maker for the two data breaches it had in 2022….

Read More
Microsoft Hesitates About Machine Learning Can Also Be Used By Hackers

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly…

Read More
computer girl

novoShield Emerges From Stealth With Mobile Phishing Protection App

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield, the new solution was created to shield organizations and end users…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

The FBI has issued a warning about an uptick in hacks aimed at stealing cryptocurrencies from decentralised finance (DeFi) services. The government claims that criminals are using the rising popularity…

Read More
Geoscience Australia Highly Vulnerable to Cyber Attack min

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the specifics of a problem with a CrowdStrike product. Following the disclosure, CrowdStrike clarified…

Read More
DDoS Attackers

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download customers’ recorded camera footage. The flaw was spotted and reported to…

Read More
Understanding What Is Malware Analysis

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has uncovered a new social engineering scheme in which the hackers…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register