Hacker Guccifer All Set To Be Extradited To US to Serve Sentence

Hacker Guccifer All Set To Be Extradited To US to Serve Sentence

Marcel Lehel, a 42-year-old hacker better known by his pseudonym “Guccifer,” achieved notoriety when he released an email with images of paintings by former President George W. Bush, including a…

Read More
Web Hosting Provider Suffers Data Breach Second Time in a Year 1

Web Hosting Provider Suffers Data Breach Second Time in a Year

The South African department of web hosting provider Hetzner suffers yet another data breach, its second one in the course of a year. In a report dated October 11, 2018,…

Read More
Open EDR
Chrome based Browsers Have Loopholes that Enable Hackers to Infiltrate Wifi Routers

Loopholes in Chrome enable Hackers Break Into WiFi Routers

Surecloud, a cybersecurity firm has released a report about a Google Chrome, Chromium, Opera, Vivaldi and other Blink-engine based browsers’ unpatched flaw that enables cybercriminals to penetrate the home wifi…

Read More
Minnesota Man Charged for Employing ‘Hacker for hire’ to Target Local Business Website

How An Ex-Hacker From The NSA Dominated Def Con Conference

A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system can be very easily hacked by simply tweaking…

Read More
GDPR Non Compliance Is Not An Option

GDPR: Non-Compliance Is Not An Option

Visit any reputable website today, and you may encounter a pop-up similar to the sample below: This is not a coincidence, as it is mandated by EU General Data Protection…

Read More
Cyber Criminals

Is The World Cup a Hacker’s Paradise?

As the digital world continues to turn, the risk of cyberattack is always on the horizon. And the arrival of the 2018 FIFA World Cup has served up more than…

Read More
why Hackers have it easy with Cloud Security will surprise you

The Surprising Ways Hackers are Exploiting the Cloud

Are hackers smarter and more creative than cyber guardians? This is becoming the eternal question of the digital age. While we would like to think the protection of customer passwords…

Read More
can believe distributed grid vulnerable cyber attack

The Different Phases of a Cyber Attack

As we begin to discuss the different phases of a cyber attack, let’s not forget that things are changing drastically as regards the cyber security industry. Hacks today are being…

Read More
Hire a Hacker is the latest in Cyber Crime Service

Hire a Hacker is the latest in Cyber Crime Service

Guess, what it must be when you see a guy a user on the dark web claims that he can track any individual anywhere in the world, what will be…

Read More
Hacking

Hacking : Explained

Hacking is a process to interrupt the normal functioning of the systems connected to a network. The person involved in the process of hacking is called the hacker. The term…

Read More

Page 2 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register