Security

Android Security

Beware of Fake Samsung Firmware Update App

Are you a Samsung smartphone user? Then this news item is for you; we recommend to only accept official updates for your Samsung Device using the official Kies app or…

Read More
5 Apps To Clean And Free Up Storage Space in Android

Have you ever seen the warning message on your Google Android smartphone: Android storage is insufficient? This means that you do not have enough space to take more photos or…

Read More
Simple Mitigation Tips For Securing Android E-Readers

Android e-readers are not taking any headlines when manufacturers are announcing their products. However, the e-ink based Android tablets are still selling like hotcakes, given it provides more flexibility than…

Read More
iOS Version of Exodus Android Spyware Doing the Rounds

Security researchers have discovered a dangerous iOS spyware strain that was seen earlier this year on the official Google Play Store. Exodus is the name of the spyware and it…

Read More
Google Duplex Assistant to Reach iPhones, Most Android Phones

It’s time to welcome the Google Duplex Assistant, which will soon be available on all iPhones and most Android phones as well… It was at Google’s I/O developer conference in…

Read More

GDPR

5 Important GDPR Requirements

In May 2018, the General Data Protection Regulation (GDPR) was enforced by the European Union (EU) to protect its citizens from the misuse of their personal data. This breakthrough regulation…

Read More
Troublesome 1,500 Hotel Chains Inadvertently Leaking Customer Data

Symantec, a mainstream antimalware vendor has disclosed the result of their study that reveals that 67% of hotel websites experienced leaks with its respective booking systems. The leakage continues and…

Read More
French Regulatory Commission Orders $50 M Fine Against Google

Google has been slapped by a 50-million Euro fine by CNIL (Commission Nationale de L’informatique et des Libertés), France’s Data Regulation Agency due to GDPR (General Data Protection Regulation) violation….

Read More
2018 Is A Better Year For Customer Data Privacy Due To GDPR

2018 can be summarized as the year when strict implementation of customer data protection policies was felt by the public, regardless of where they are located in the world. This…

Read More

DDoS

Telegram Recovers from DDoS Attack

Telegram Messenger, which had suffered a DDoS (Distributed Denial of Service) attack recently, has reportedly recovered from the same and everything now seems stabilized, as per reports. A ZDNet report,…

Read More
“Denial-of-Service Condition” Impacts US Energy Company

A “denial-of-service condition” has reportedly impacted a US energy company that provides power to many western states. TechCrunch reports, “An energy company providing power in several western U.S. states experienced…

Read More
All About Preventing DDoS Attack on Enterprise Networks

For any enterprise today, a DDoS (Distributed Denial of Service) attack could mean a real headache. Such an attack could throw out of gear all business activities and all operations…

Read More
DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV

The threat of DDoS (Denial-of-Service) attacks that send massive processing demands from multiple Internet-connected devices (be it a PC, a smartphone, a tablet or an IoT) to the target server…

Read More
DOS Attacks and Free DOS Attacking Tools

Denial-of-service (DoS) attacks are the antecedent to DDoS attacks. Earlier, DoS attacks were the main source to disrupt computer systems on a network. It originates from a single machine and…

Read More

Infographics

Meanwhile, here is the best alternative to access the best Torrents sites that is a well-known and widely used and accessed by more than millions of visitors daily across the…

Read More
Why You Should Move to Cloud Computing

It’s worth it, cloud computing includes benefits and gives you the flexibility of connecting to your business from anywhere, any time. Increase operation efficiency and reduce IT spending. Read here…

Read More
Key Things to Scale The Internet of Things

IoT success. The companies that succeed in transforming their operations and business models through IoT are those that will have weighed all the considerations, planned thoroughly, and implemented carefully. Related…

Read More

Discussing basic data loss prevention steps. Data loss prevention can be done by doing certain basic things like installing a firewall and anti-virus software, ensuring proper backup of files and…

Read More

All Security News

Cybersecurity In Mid-2019 Nothing To See Here, Same Problems

The need for cybersecurity measures has been viewed as an issue, however, many companies have problems with countermeasures, as proven by our many years of coverage of cybersecurity news here…

Read More
Singapores IT Security Outlook

Singapore continues to be a role model when it comes to the fight towards cybersecurity readiness in Southeast Asia. The city-state has learned a lot from last year’s SingHealth data…

Read More
United Kingdom’s NCSC Advisory vs DNS Hijacking Released

The United Kingdom’s National Cyber Security Centre (NCSC) has issued an advisory warning UK citizens using computers and other Internet-connected mobile devices that large-scale DNS hijackings in the Internet are…

Read More
Why PCI DSS Compliance Is Important For Smartcards

As more and more people are conducting their everyday financial transaction needs through the use of smartcards, that is the reality on the ground. People use less cash, and the…

Read More
TrickBots TrickBooster Update Compromised 250M Emails

Last Valentines day, we made a fearless declaration here in Hackercombat.com, that Trickbot is shaping itself of becoming the “malware of the year”, due to its massive campaigns of infecting…

Read More
eCh0raix Ransomware Targeting QNAP Devices

The newly discovered ransomware family targets the QNAP network attached storage (NAS) devices. This malicious program, known by security researcher Anomali as eCh0raix (identified by Trend Micro as Ransom.Linux.ECHORAIX.A), was…

Read More
Mobile Browsers’ Google Safe Browsing Flaw In 2018 Revealed

A report, based on the Belgium-based NWT VRT revealed that Google employees routinely listened to audio files recorded by Google Home Smart Home speaker, and Google Assistant smartphones. As per…

Read More
New Hacking Technique Using Bluetooth Exposed

Bluetooth makes it easy to transfer files, photos, and documents to devices, such as mobile phones, PDAs, and laptops in a short distance. This wireless communication protocol was developed in…

Read More
Pale Moon Archive Server Infected With Malware

Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C….

Read More
Remove TV Adware With These Easy Steps

It may be irritating, your screen is full of ads, and when you close one, another appears. Yes, we are talking about adware. What is adware? Adware is synonymous with…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register