Smartphones today are pocket-sized computers. We use them for web browsing, cash transactions, gaming, official and business correspondences and much more. Moreover, with BYOD being an accepted trend in the…
Read More
Smartphones today are pocket-sized computers. We use them for web browsing, cash transactions, gaming, official and business correspondences and much more. Moreover, with BYOD being an accepted trend in the…
Read More
The US FDA (Food and Drug Administration) has recalled almost half a million pacemakers following fears pertaining to hacking. They fear that laxity in cybersecurity could lead to these pacemakers…
Read More

A huge spambot that has ensnared as many as 711 million email addresses has been uncovered by a Paris-based security researcher. The researcher, who goes by the pseudonymous handle Benkow,…
Read More
Budding cyber criminals are going to have a field day with a DIY Android ransomware app which has been doing rounds for some time now, and is purportedly available for…
Read More
A hacking group calling itself as “OurMine” has claimed that it has hacked into Sony PlayStation network and its Facebook and Twitter accounts. It had hacked PlayStation social accounts and…
Read More
For HBO there seems to be no end to their hacking woes; it just seems to go on and on… It was just about a week ago that the cable…
Read More
Malware-Loaded Phone Screen Replacements Cybercriminals have successfully been able to insert malicious chips in smartphone screens. So, suppose you face an issue with your smartphone – specifically, its screen –…
Read More
At the point when staff at CyberKeel examined the emails at a medium-sized shipping firm, they made a stunning disclosure – that to their surprise shipping companies are pried over…
Read More
Security experts have expressed deep dismay at Hackers attacking Shipping firms, which they are able to successfully compromise. Having plagued a wide variety of business sectors and industries, Cyber criminals…
Read More
Hacking is a process to interrupt the normal functioning of the systems connected to a network. The person involved in the process of hacking is called the hacker. The term…
Read More