Pharming Alert on a Red Binary Danger Background

Pharming: Everything You Need to Know

Information Technology crime has become a well-established business where cybercriminals are mainly in for economic benefit.These malicious actors are increasingly using techniques that target...
programming code

Inside the “Hack” Programming Language

“Hack” is a programming language developed some years ago by a team of Facebook engineers who wanted to enhance their daily efficiency by increasing...
A woman hand holding Uber app showing on Samsung note 3 in the car

Dark Web Vendor Admits to Hacking 17 Companies Including Uber & Groupon

Grant West, a notorious U.K. cybercriminal, has admitted to a series of serious charges including fraud, hacking and selling drugs through the dark web.The...

How to Become a Professional Hacker — 10 Credible Tips for Beginners

Anyone can write up an outlandish cyberpunk username and pose as a hacker. However, there is so much that goes into becoming a professional...

Israel Hacked Kaspersky, Alerted U.S. of Russian Hacking Attempts

Russian hackers were allegedly caught in the act by Israeli intelligence officials for attempting to spy and obtain confidential information from the U.S. government.This...

Dossier by WikiLeaks Shows How The CIA Spies On Its Targets

WikiLeaks released a dossier, dubbed Vault 7, demonstrating how the U.S. Central Intelligence Agency (CIA) gathers intelligence by spying on their perceived targets and...

Top 10 Online Scams You Should Know, And How To Avoid Them

Cybercrime is a very lucrative business. In fact, some studies say online scams are turning over more money than drug trafficking.So, if you are...
water drops on the Hewlett Packard logo

HP is Installing Telemetry Bloatware Without Users’ Consent

Hewlett Packard (HP) is discretely installing a form of spyware known as telemetry bloatware without the consent of the owner of the desktop machine...

Most Notorious and Famous Cyber Gangs

In a world where cybercrime is rampant, we must take a look at the groups that facilitate major hacks causing both reputational and financial...
Uber building

Data Breach at Uber Technologies Affects Approximately 57 Million Persons

For more than a year now, Uber Technologies has remained mute about a massive breach at the tech firm where hackers obtained personal details...
Physical version of Bitcoin (new virtual money) and North Korea Flag. Conceptual image for investors in cryptocurrency and Blockchain Technology in North Korea.

North Korea Targets More Cryptocurrency Firms

Inside North Korea’s efforts targeting hacks to cryptocurrency companies for financial gains.
DNS ddos attack

DNS Hijacking: What Is It And How It Can Affect You?

DNS hijacking, also known as silent server swaps, is a malicious attack vector that can be used to forcibly redirect web traffic to websites...

Hackers Arrested as They Attend Hacking Conference

Marcus Hutchins, the British hacker who helped contain the recent spread of the notorious WannaCry ransomware, has been arrested while attending the DEFCON conference...
username and password in binary background

Data Breach at TIO Networks, A Subsidiary of PayPal

TIO Networks, a Canada-based subsidiary of PayPal that offers digital payments services, has experienced a security breach in which the data of nearly 1.6...
Judges Gavel Computer Keyboard And Real Handcuffs On The Rough Brown Wood Table

Hacker Who Orchestrated Spear Phishing Attack Targeting Yahoo Accounts Pleads Guilty

A 22-year-old Canada-born hacker by the name of Karim Baratov has pleaded guilty to charges of assisting Russian federal officers in accessing hundreds of...

An Inside Look at US-China Relations Regarding Cybersecurity

The relationship between China and the United States has changed drastically over the last few years.The diplomatic understanding between these two countries has significantly...
Asylum papers on a table

Fugitive Hacker, Activist Seeks Asylum in Mexico

A hacker from the group known as Anonymous has been on the run for a long time now. This time around, Anonymous is asking...
Domain name choice concept. Knob switch button and website internet domain names

DNS Spoofing Explained

In simple terms, the act of diverting an internet user to a false IP address is called DNS spoofing.Some in the trade call it...

Get Ready to Be Carjacked in 2018. Or Not.

You may have heard of the recent spurts in carjacking all over the globe by a new breed of smart thieves.Perhaps you brushed it...

Cyber Espionage Increasingly Common Among Governments

In the wake of increased cyber activities among governments globally, it is no doubt that some countries will employ whatever technological means available to...

NSA Breach Allegedly Linked to Russian Company

It is now confirmed—the United States National Security Agency has been hit again by a cyber attack.This time, a cyber security company linked to...

Police Arrest Alleged Admin of One of the Largest Data Repositories on the Internet

The Royal Canadian Mounted Police have arrested an Ontario man who is accused of running a database which was selling usernames and passwords belonging...
Iranian hacker laptop with binary computer code and Iran flag on the screen. Internet and network security.

Iranian Hackers Target Israeli Citizens in Cyber Attack

State-sponsored hackers from Iran have targeted Israeli citizens who are believed to possess information regarding certain people of interest.ClearSky, a cybersecurity firm based in...
hbo under attack

HBO Under Attack as Hackers Threaten to Leak Series

The popular American television network HBO has suffered a hack on its social media accounts, but what’s more concerning is the attackers have gained...

Gaming Keyboards that Contain Keyloggers

Espionage is a vice that is put into practice at large by various parties intending to dig out more information or collect data due...
travel agency website

Hong Kong Travel Agency Suffers Major Data Hack

Hong Kong is one of the world’s top tourist hubs. It’s an administrative center with an expanding threshold of businesses basing their headquarters in...

OurMine Releases Vevo Videos after Hack

The notorious hacking group OurMine is at it again, this time leaking Vevo videos and releasing 3.12 TeraBytes of data to the public.The group...
Crypto Currency Word Cloud

DUHK: A New Crypto Attack Discovered

The type of hacking attempts that take place in modern times overthrow every security claim and gain access to even the most impenetrable systems...
A red sign with text Hacking in Chinese flag colors on a keyboard

The United States Charges Chinese Citizens Over Hacking

Three Chinese based hackers have been charged by a Unites States court with hacking into companies and stealing sensitive information from them.The hackers were...
transporting system

DDoS Attack Halts Swedish Transport Systems

A distributed denial of service has hit the Sweden transport system, specifically its train network. This has rendered delays in some areas to access train services, all as a result of automated booking and other services.

Hacking in the Aviation industry

In the wake of increased cybercrime, we see that the threat of hackers gaining control over planes in motion is indeed possible.In some documented...

Spanish Court Extradites Russian Hacking Suspect to the United States

The Spanish high court has come to a conclusion to extradite Pyotr Levashov, a Russian hacker, to the United States.He is purported to be...
Online crime scene with a finger print left on backlit keyboard with Chinese flag on it

200 Million Japanese Users’ Data Sold on the Dark Web by Chinese Hackers

Hackers peddling stolen data on the dark web may not be something new. But a report suggests that one forum in the dark web...
laptop with North Korea

North Korea Hack Compromises South Korea’s Military Blueprint

North Korea has been on the global watch list for a long time now. This is out of the mere fact that it has...

AfricaHackOn: Group in Africa Aims to Create & Improve Cyber Security

AfricaHackon, a cyber security firm established in the East African region in collaboration with relevant stakeholders, aims to raise awareness about internet security and improve it as well.

Hacking Group “Shadow Brokers” Threatens to Unmask Former NSA Hacker

The Shadow Brokers, a hacking group famed to the perpetrators behind an infamous NSA hack in which several exploits were stolen, is now threating...
kenyan elections hacked

Results of Kenya’s Presidential Tally Hacked, Claims Opposition Leader

As countries embrace technology in conducting their general elections, it is no doubt that a section of key players might employ dubious means to...

Hacked ‘Fortnite’ Data Surfaces on the Dark Web

Recently, personal data belonging to players of the popular game Fortnite has appeared on the dark web.Hackers reportedly obtained the information from the system’s...

The Dark Overlord Hacking Group Leaks Stolen 9/11 Files

After several days of threats, infamous hacking group The Dark Overlord has delivered on its promise to release a series of stolen 9/11 documents...
system hacked

Hacks in Learning Institutions: Students Employ Hacking Methods to Change Grades

Students, especially those in institutions of higher learning universities, are taking their game a notch higher by employing hacking methods to alter their end-of-semester...

Researchers Claim Billion-Dollar Hacking Group FIN7 Is Still on the Loose

A notorious hacking group known as FIN7 is still targeting individuals and businesses, despite the recent arrest of three of its members.As is common...
The homepage of the official website for the Reddit social news website, on 20th April 2017.

Reddit Hit by Security Breach, User Data Exposed

Reddit has recently revealed that it suffered a security breach which subsequently exposed substantial user data.Confirming the incident through an official statement, Reddit Chief...

British Airways Customers’ Credit Card Details Likely Already for Sale on the Dark Web

British Airways is investigating a case where the credit card details of around 380,000 customers were stolen from its website in a hack.This happened...

Email Validation Service Verifications.io Leaks Personal Records of 2 Billion Users

Once again, researchers have uncovered yet another leaked database containing a vast set of personal data. This latest discovery was unearthed by Bob Diachenko,...

Login Details from Singaporean Government Agencies for Sale on the Dark Web

Asia is increasingly becoming a lucrative high-tech crime target for cybercriminals, Singapore receiving much of the attention.Within the past two years, stolen user information...
Exclusive Interview Microphone Questions Answers Show 3d Illustration

Exclusive Interview with Commander X

Christopher Doyon, more commonly known by the pseudonym Commander X, has been one of the hacktivist communities’ more public figures in recent years, known...

773M Email Addresses and 21M Passwords Exposed in Data Dump

A data breach containing more than 773 million emails and 21 million passwords was discovered online by Troy Hunt, a security developer and regional...

Hackers Are Using These Tools to Reel in New Victims

Illegal cyber operations have currently gained momentum as attackers have invested in a variety of hacking tools to use to attack people.These hacking tools...

Hackers on the Dark Web Are Targeting Crucial Data in Police Websites

Private data belonging to over 350 citizens in Bengaluru, India has been leaked on the dark web after the websites of Karnataka State Police...

Azorult Malware Advertised for Sale on Darknet Forums

Cybercrime has been greatly assisted by the free sale of hacking tools via the dark web.Recently, an updated version of Azorult, a type of...

Send this to a friend