Online crime scene with a finger print left on backlit keyboard with Chinese flag on it

200 Million Japanese Users’ Data Sold on the Dark Web by Chinese Hackers

Hackers peddling stolen data on the dark web may not be something new. But a report suggests that one forum in the dark web...

Police Arrest Alleged Admin of One of the Largest Data Repositories on the Internet

The Royal Canadian Mounted Police have arrested an Ontario man who is accused of running a database which was selling usernames and passwords belonging...
A woman hand holding Uber app showing on Samsung note 3 in the car

Dark Web Vendor Admits to Hacking 17 Companies Including Uber & Groupon

Grant West, a notorious U.K. cybercriminal, has admitted to a series of serious charges including fraud, hacking and selling drugs through the dark web.The...
Pharming Alert on a Red Binary Danger Background

Pharming: Everything You Need to Know

Information Technology crime has become a well-established business where cybercriminals are mainly in for economic benefit.These malicious actors are increasingly using techniques that target...
DNS word cloud

What is a DNS Rebinding Attack?

DNS rebinding is a Domain Name System-based attack on the codes embedded in a webpage.Through DNS rebinding, an attacker can compromise unpatched internal systems,...
DNS ddos attack

DNS Hijacking: What Is It And How It Can Affect You?

DNS hijacking, also known as silent server swaps, is a malicious attack vector that can be used to forcibly redirect web traffic to websites...
Domain name choice concept. Knob switch button and website internet domain names

DNS Spoofing Explained

In simple terms, the act of diverting an internet user to a false IP address is called DNS spoofing.Some in the trade call it...
Iranian hacker laptop with binary computer code and Iran flag on the screen. Internet and network security.

Iranian Hackers Target Israeli Citizens in Cyber Attack

State-sponsored hackers from Iran have targeted Israeli citizens who are believed to possess information regarding certain people of interest.ClearSky, a cybersecurity firm based in...

Top 10 Online Scams You Should Know, And How To Avoid Them

Cybercrime is a very lucrative business. In fact, some studies say online scams are turning over more money than drug trafficking.So, if you are...
Physical version of Bitcoin (new virtual money) and North Korea Flag. Conceptual image for investors in cryptocurrency and Blockchain Technology in North Korea.

North Korea Targets More Cryptocurrency Firms

Inside North Korea’s efforts targeting hacks to cryptocurrency companies for financial gains.

Get Ready to Be Carjacked in 2018. Or Not.

You may have heard of the recent spurts in carjacking all over the globe by a new breed of smart thieves.Perhaps you brushed it...
Secure firewall network virus malware hack protection online internet security

11 Credible Tips To Protect Yourself From Being Hacked Online

Today, cybercrime has gone 3D. There so many avenues to invade an online computer. Any ordinary person who is determined to compromise your online...
Judges Gavel Computer Keyboard And Real Handcuffs On The Rough Brown Wood Table

Hacker Who Orchestrated Spear Phishing Attack Targeting Yahoo Accounts Pleads Guilty

A 22-year-old Canada-born hacker by the name of Karim Baratov has pleaded guilty to charges of assisting Russian federal officers in accessing hundreds of...
A red sign with text Hacking in Chinese flag colors on a keyboard

The United States Charges Chinese Citizens Over Hacking

Three Chinese based hackers have been charged by a Unites States court with hacking into companies and stealing sensitive information from them.The hackers were...
Cyber crime hand reaching out through laptop computer

10 Signs You’ve Been Hacked – and What to Do Next

While getting hacked has become almost as common as breathing, it is not easy to tell when your computer has been compromised. Fraudsters are...
water drops on the Hewlett Packard logo

HP is Installing Telemetry Bloatware Without Users’ Consent

Hewlett Packard (HP) is discretely installing a form of spyware known as telemetry bloatware without the consent of the owner of the desktop machine...

An Inside Look at US-China Relations Regarding Cybersecurity

The relationship between China and the United States has changed drastically over the last few years.The diplomatic understanding between these two countries has significantly...
username and password in binary background

Data Breach at TIO Networks, A Subsidiary of PayPal

TIO Networks, a Canada-based subsidiary of PayPal that offers digital payments services, has experienced a security breach in which the data of nearly 1.6...
Asylum papers on a table

Fugitive Hacker, Activist Seeks Asylum in Mexico

A hacker from the group known as Anonymous has been on the run for a long time now. This time around, Anonymous is asking...
laptop with North Korea

North Korea Hack Compromises South Korea’s Military Blueprint

North Korea has been on the global watch list for a long time now. This is out of the mere fact that it has...
travel agency website

Hong Kong Travel Agency Suffers Major Data Hack

Hong Kong is one of the world’s top tourist hubs. It’s an administrative center with an expanding threshold of businesses basing their headquarters in...

How to Become a Professional Hacker — 10 Credible Tips for Beginners

Anyone can write up an outlandish cyberpunk username and pose as a hacker. However, there is so much that goes into becoming a professional...
Uber building

Data Breach at Uber Technologies Affects Approximately 57 Million Persons

For more than a year now, Uber Technologies has remained mute about a massive breach at the tech firm where hackers obtained personal details...
programming code

Inside the “Hack” Programming Language

“Hack” is a programming language developed some years ago by a team of Facebook engineers who wanted to enhance their daily efficiency by increasing...
system hacked

Hacks in Learning Institutions: Students Employ Hacking Methods to Change Grades

Students, especially those in institutions of higher learning universities, are taking their game a notch higher by employing hacking methods to alter their end-of-semester...

Gaming Keyboards that Contain Keyloggers

Espionage is a vice that is put into practice at large by various parties intending to dig out more information or collect data due...
Crypto Currency Word Cloud

DUHK: A New Crypto Attack Discovered

The type of hacking attempts that take place in modern times overthrow every security claim and gain access to even the most impenetrable systems...
transporting system

DDoS Attack Halts Swedish Transport Systems

A distributed denial of service has hit the Sweden transport system, specifically its train network. This has rendered delays in some areas to access train services, all as a result of automated booking and other services.

Cyber Espionage Increasingly Common Among Governments

In the wake of increased cyber activities among governments globally, it is no doubt that some countries will employ whatever technological means available to...

NSA Breach Allegedly Linked to Russian Company

It is now confirmed—the United States National Security Agency has been hit again by a cyber attack.This time, a cyber security company linked to...

Spanish Court Extradites Russian Hacking Suspect to the United States

The Spanish high court has come to a conclusion to extradite Pyotr Levashov, a Russian hacker, to the United States.He is purported to be...

Israel Hacked Kaspersky, Alerted U.S. of Russian Hacking Attempts

Russian hackers were allegedly caught in the act by Israeli intelligence officials for attempting to spy and obtain confidential information from the U.S. government.This...

OurMine Releases Vevo Videos after Hack

The notorious hacking group OurMine is at it again, this time leaking Vevo videos and releasing 3.12 TeraBytes of data to the public.The group...

Hackers Arrested as They Attend Hacking Conference

Marcus Hutchins, the British hacker who helped contain the recent spread of the notorious WannaCry ransomware, has been arrested while attending the DEFCON conference...

WikiLeaks Website Infiltrated By OurMine

The notorious cyber group OurMine is back at it, and it has now infiltrated Julian Assange’s notorious whistle-blowing website WikiLeaks.The hack was made to...

Dossier by WikiLeaks Shows How The CIA Spies On Its Targets

WikiLeaks released a dossier, dubbed Vault 7, demonstrating how the U.S. Central Intelligence Agency (CIA) gathers intelligence by spying on their perceived targets and...
kenyan elections hacked

Results of Kenya’s Presidential Tally Hacked, Claims Opposition Leader

As countries embrace technology in conducting their general elections, it is no doubt that a section of key players might employ dubious means to...
hbo under attack

HBO Under Attack as Hackers Threaten to Leak Series

The popular American television network HBO has suffered a hack on its social media accounts, but what’s more concerning is the attackers have gained...

AfricaHackOn: Group in Africa Aims to Create & Improve Cyber Security

AfricaHackon, a cyber security firm established in the East African region in collaboration with relevant stakeholders, aims to raise awareness about internet security and improve it as well.

Hacking in the Aviation industry

In the wake of increased cybercrime, we see that the threat of hackers gaining control over planes in motion is indeed possible.In some documented...

Most Notorious and Famous Cyber Gangs

In a world where cybercrime is rampant, we must take a look at the groups that facilitate major hacks causing both reputational and financial...

Hacking Group “Shadow Brokers” Threatens to Unmask Former NSA Hacker

The Shadow Brokers, a hacking group famed to the perpetrators behind an infamous NSA hack in which several exploits were stolen, is now threating...

Send this to a friend