Smartphones today are pocket-sized computers. We use them for web browsing, cash transactions, gaming, official and business correspondences and much more. Moreover, with BYOD being an accepted trend in the…
Read MoreSmartphones today are pocket-sized computers. We use them for web browsing, cash transactions, gaming, official and business correspondences and much more. Moreover, with BYOD being an accepted trend in the…
Read MoreThe US FDA (Food and Drug Administration) has recalled almost half a million pacemakers following fears pertaining to hacking. They fear that laxity in cybersecurity could lead to these pacemakers…
Read MoreA huge spambot that has ensnared as many as 711 million email addresses has been uncovered by a Paris-based security researcher. The researcher, who goes by the pseudonymous handle Benkow,…
Read MoreBudding cyber criminals are going to have a field day with a DIY Android ransomware app which has been doing rounds for some time now, and is purportedly available for…
Read MoreA hacking group calling itself as “OurMine” has claimed that it has hacked into Sony PlayStation network and its Facebook and Twitter accounts. It had hacked PlayStation social accounts and…
Read MoreFor HBO there seems to be no end to their hacking woes; it just seems to go on and on… It was just about a week ago that the cable…
Read MoreMalware-Loaded Phone Screen Replacements Cybercriminals have successfully been able to insert malicious chips in smartphone screens. So, suppose you face an issue with your smartphone – specifically, its screen –…
Read MoreAt the point when staff at CyberKeel examined the emails at a medium-sized shipping firm, they made a stunning disclosure – that to their surprise shipping companies are pried over…
Read MoreSecurity experts have expressed deep dismay at Hackers attacking Shipping firms, which they are able to successfully compromise. Having plagued a wide variety of business sectors and industries, Cyber criminals…
Read MoreHacking is a process to interrupt the normal functioning of the systems connected to a network. The person involved in the process of hacking is called the hacker. The term…
Read More