Security News

Elements Of A Well Researched Phishing Email Attempt 1

Elements Of A Well Researched Phishing Email Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money…

Read More
Office 365 G Suite Cloud Accounts Hacked Using IMAP Protocol

Office 365, G Suite Cloud Accounts Hacked Using IMAP Protocol

Hackers are now using IMAP protocol to hack Office 365 and G Suite cloud accounts, bypassing multi-factor authentication; and these kinds of attacks are difficult to protect against, according to…

Read More
Open EDR
Telegram Gained 3 Million New Users Due To Facebook Downtime 1

Telegram Gained 3 Million New Users Due To Facebook Downtime

The recent Facebook downtime became a blessing in disguise for Telegram, a Facebook Messenger competitor. The App grew with 3 million new users overnight, as the most used instant messaging…

Read More
Breed Ready” Women Database Discovered In A Chinese IP

“Breed Ready” Women Database, Discovered In A Chinese IP

China is known to have full control of information flow inside its borders. The primary tool the Chinese authorities use to control the flow of data and information is their…

Read More
Old WinRar Bug Caused Trouble For Users

Due To Disabled Auto-Update: Old WinRar Bug Caused Trouble For Users

Just like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security vulnerability from being taken advantage of by 3rd…

Read More
Phishing Attack on San Diego School Led to Data Leaked

Phishing Scam Hits Carmel Unified School District

The Carmel Unified School District in the state of California has reportedly been hit by a phishing scam. Reports say that the Carmel Unified School District has sent out an…

Read More
Box.com Flaw Enables Folder File Access To Unauthorized Users 1

Box.com Flaw Enables Folder/File Access To Unauthorized Users

A critical flaw in Box.com cloud-storage solution was recently discovered that make files stored in the service accessible by external unauthorized users if users are not security-conscious. Box.com is a…

Read More
Vulnerabilities Discovered in Swiss E Voting System 1

Vulnerabilities Discovered in Swiss E-Voting System

Technical flaws were detected in the Swiss government’s electronic voting system. A team of cybersecurity researchers on Tuesday found this defect which could enable outsiders to replace legitimate votes with…

Read More
WordPress Plugin WooCommerce is Vulnerable to XSS Attacks 1

WordPress Plugin WooCommerce is Vulnerable to XSS Attacks

As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into the bandwagon effect. Plugins are a double-edged sword;…

Read More
Hackers Used Slack To Avoid Network and Endpoint Detection 1

Hackers Used Slack To Avoid Network and Endpoint Detection

Notoriety is what hackers thrive on, no matter if it fetches them money or their dirty deeds flash on the news headlines. Network hacks are on the rise and increasing…

Read More

Page 30 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register