Security

Android Security

European Android Devices Google Is The Old Microsoft

The European Union has flexed its muscles again to combat anti-competitive behavior. This time around, it is Google that is in the receiving end of the order. The search giant…

Read More
4-Most-Recognizable-Android-Antimalware-Apps-You-Can-Install-Today

Antimalware Apps Recently, Google went out of their way to clean-up Google Play Store from apps pretending to be antimalware apps, but really just consuming resources of the Android device….

Read More
Beware Of Deceptive Antimalware Apps In Android

Right after Windows, antimalware vendors have set their sights on Android as their next “platform” to protect (or at the very least claiming to protect). As Windows is an undisputed…

Read More
A Closer Look At Simple Signs That A Is Possibly Smartphone Is Infected

In a previous article we wrote here in Hackercombat.com, we have emphasized the need to change user’s perception regarding smartphones. It is not just a phone, but rather the ‘personal…

Read More
virus removal for android

Google Android is a widely used operating system for mobile devices, in fact, it has even surpassed Microsoft Windows as the most used operating system across all computing devices. What…

Read More

GDPR

French Regulatory Commission Orders $50 M Fine Against Google

Google has been slapped by a 50-million Euro fine by CNIL (Commission Nationale de L’informatique et des Libertés), France’s Data Regulation Agency due to GDPR (General Data Protection Regulation) violation….

Read More
2018 Is A Better Year For Customer Data Privacy Due To GDPR

2018 can be summarized as the year when strict implementation of customer data protection policies was felt by the public, regardless of where they are located in the world. This…

Read More
Canada is Imitating EU’s GDPR, New Policy Takes Effect On Nov 2018 (2)

Canada has apparently imitated European Union’s GDPR, that is the latest news from the country’s Office of Privacy Commissioner of Canada (OPC). Under the new policy, starting November 2018, all…

Read More
Cambridge-Analytica Fiasco Aftermath Facebook to pay $645,000 Fine under UK Law

The fallout against Facebook has started, caused by the user data exposure breach due to its Cambridge-Analytica fiasco, starting with the UK’s ICO (Information Commissioner’s Office). ICO has slapped the…

Read More

DDoS

DOS-Attacks-and-Free-DOS-Attacking-Tools

Denial-of-service (DoS) attacks are the antecedent to DDoS attacks. Earlier, DoS attacks were the main source to disrupt computer systems on a network. It originates from a single machine and…

Read More
Facebook Suffers Biggest Ever Outage in its History

Facebook, which has suffered the biggest ever outage in its history, is struggling to deal with it. The partial outage that affected some users of Facebook and other platforms owned…

Read More
Why Disable SSDPUPnP In Today’s Home And Enterprises

When Did UPnP and SSDP Became Mainstream? Universal Plug and Play (UPnP) was considered revolutionary when it was introduced to Windows Millennium Edition nineteen years ago, in 2000. It was…

Read More
6 Young Hackers Caught DDoSing and Stealing Money From Bank Accounts

Six years jail time, that may become the penalty awaiting the 6 young hackers, two who were allegedly responsible for DDoS (Distributed Denial of Service) attack against Ukraine government and…

Read More
10 Masterful Steps In Combating Denial Of Service Attacks

We could define DDoS (Distributed Denial of Service) attacks as the exclusive appropriation of a resource or service with the intention of avoiding any third party access. Also included in…

Read More

Infographics

Meanwhile, here is the best alternative to access the best Torrents that is a well-known and widely used and accessed by more than millions of visitors daily across the world….

Read More
Why You Should Move to Cloud Computing

It’s worth it, cloud computing includes benefits and gives you the flexibility of connecting to your business from anywhere, any time. Increase operation efficiency and reduce IT spending. Read here…

Read More
Key Things to Scale The Internet of Things

IoT success. The companies that succeed in transforming their operations and business models through IoT are those that will have weighed all the considerations, planned thoroughly, and implemented carefully. Related…

Read More

Discussing basic data loss prevention steps. Data loss prevention can be done by doing certain basic things like installing a firewall and anti-virus software, ensuring proper backup of files and…

Read More

All Security News

Teenager Hacked His SchoolMates’ Records Using His Teacher’s Account

We are in an age where millennials do outsmart adults when it comes to utilizing technology. More and more scenes we often see where young people teaching their baby boomer…

Read More
European Android Devices Google Is The Old Microsoft

The European Union has flexed its muscles again to combat anti-competitive behavior. This time around, it is Google that is in the receiving end of the order. The search giant…

Read More
Google Still Going Strong Even After 3rd Antitrust Fine

As we can remember, Google uses its strong influence in the market in order to get ahead of their competition in the advert market, something that enters the territory of…

Read More
Website Malware Scanner

Elements Of A Well Researched Phishing Attempt

Phishers for decades have honed their skills of persuasion, that is why the art of fooling people through an Internet-messaging method is a huge business by cybercriminals. There is money…

Read More
Community Efforts Against Ransomware

Ransomware attacks are by nature loud, they immediately inform the user of the device that their files are encrypted, and they need to “pay” the ransom in order for their…

Read More
What is Cybercrime , How to Prevent Cybercrime

The Cybercrime Definition Cybercrime can be defined as any criminal activity involving any networked device (computer, smartphone etc) or a network itself. In cybercrime, a computing device is either the…

Read More
Facebook Stored User Passwords in Plain Text for Years!

Facebook had for years stored hundreds of millions of user passwords in plain text, according to a recent report. Brian Krebs has, through his website KrebsOnSecurity, made this rather startling…

Read More
How To Deal With DNS Vulnerabilities

Believe it or not, in the early days of the Internet, all the domain names (nodes) it had been listed in just one file, the host file. Today, the host…

Read More
Two Nasty No-Ransom “PewDiePie” Ransomwares, Trouble For Many

Obsession really goes a long way for people to get out of their way to cause trouble for others. As PewDiePie emerges as a Youtube sensation, his fanbase grew to…

Read More
Google Photos Vulnerability that Lets Retrieve Image Metadata

A vulnerability that was detected in the web version of Google Photos could be used by hackers to retrieve image metadata. ZDNet reports, “Google has patched a bug in its…

Read More
Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register