Android OS API Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Android OS API-Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Researchers have uncovered an “API-breaking” vulnerability, which could expose Android device systems data to rogue apps. The sensitive information thus exposed could be misused by cybercriminals. Security researchers from Nightwatch…

Read More
Denial of Service DDoS Attack Using Kali Linux

How to Protect Businesses Against DDoS Attacks

Security, for any business today, is important; we, at HackerCombat, have already reported on the rising costs of IT security on the global level. More and more business today invest…

Read More
Open EDR
What Went Wrong The Case of India’s Cosmos Bank Cyber Heist

What Went Wrong: The Case of India’s Cosmos Bank Cyber Heist

More information has been revealed recently from the Cosmos Bank hacking incident which happened a few weeks ago. As a 112-year old banking institution, Cosmos Bank holds a high regard…

Read More
How to Use Proxy Servers to Protect Your Device and Data from Hackers

How To Use Proxy Servers To Protect Your Device And Data

What is a Proxy Server? Most people who use the internet today for professional and technical purposes know what a proxy server is. Proxy servers refer to dedicated computer systems…

Read More
The FBI Warns Banks About The Rise Of “ATM Cash Out” Attacks

The FBI Warns Banks About The Rise Of “ATM Cash-Out” Attacks

The U.S. Federal Bureau of Investigation (FBI ) has warned banks about the likelihood of cybercriminals carrying out a global fraud scheme known only as the “ATM Cash-out.” It employs…

Read More
New Money Making Scheme for Cybercriminals

New Money Making Scheme: After Ransomware Comes GDPR Extortion

The world has changed for the better when it comes to security and privacy of data, thanks to the European Union’s GDPR (General Data Protection Regulation). Companies, especially those operating…

Read More
4 Creative Ways to Secure Video Surveillance Cameras from known Vulnerability

4 Creative Ways to Secure Surveillance Cameras from known Vulnerability

Corporate systems are categorized into two: Internally developed Developed by a vendor Internally developed systems are the exact tailor fit solutions that meet the requirement of the organization. It is…

Read More
Apple released patches to address vulnerabilities in the High Sierra

The Small, Medium-Sized Enterprise vs Cyberthreats

“Small and medium-scale enterprises created jobs and strengthened support industries in domestic economies. While foreign direct investment from developed countries and the transfer of technology could aid the small and…

Read More
Video Demo of a Nasty WhatsApp flaw Released

Checkpoint Research Released Video Demo of a Nasty WhatsApp flaw

WhatsApp, the $19.3 billion mobile instant messaging platform acquisition of Facebook four years ago in 2014, has finally acknowledged the critical bug in its “Quote” function. It is a bug…

Read More
Ransomware How to retrieve data without paying Ransom

Ransomware-How to retrieve data without paying Ransom

Every company should have a tight security for their IT infrastructure in the first place. It is utmost important to realize that your data is the key to your business,…

Read More

Page 8 of 10

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register