British Airways Customers’ Credit Card Details Likely Already for Sale on the Dark Web

British Airways is investigating a case where the credit card details of around 380,000 customers were stolen from its website in a hack.This happened...
Secure firewall network virus malware hack protection online internet security

11 Credible Tips To Protect Yourself From Being Hacked Online

Today, cybercrime has gone 3D. There so many avenues to invade an online computer. Any ordinary person who is determined to compromise your online...
A red sign with text Hacking in Chinese flag colors on a keyboard

The United States Charges Chinese Citizens Over Hacking

Three Chinese based hackers have been charged by a Unites States court with hacking into companies and stealing sensitive information from them.The hackers were...

Hacking Group “Shadow Brokers” Threatens to Unmask Former NSA Hacker

The Shadow Brokers, a hacking group famed to the perpetrators behind an infamous NSA hack in which several exploits were stolen, is now threating...

Over 600 Million Hacked Accounts Available on Dream Market

There has been a new case involving the sale of stolen private data on the dark web.Recent reports reveal that a vendor has put...
hbo under attack

HBO Under Attack as Hackers Threaten to Leak Series

The popular American television network HBO has suffered a hack on its social media accounts, but what’s more concerning is the attackers have gained...
Asylum papers on a table

Fugitive Hacker, Activist Seeks Asylum in Mexico

A hacker from the group known as Anonymous has been on the run for a long time now. This time around, Anonymous is asking...

Researchers Reveal Suspect Behind Collection #1 Mega Breach

A U.S.-based cybersecurity firm, Recorded Future, alleges to have identified a hacker allegedly responsible for exposing stolen data in a recent leak dubbed Collection #1.Experts from Recorded Future’s threat...

Malicious Torrent File Malware Capable of Altering Crypto Addresses

A malicious file capable of stealing cryptocurrencies was recently caught infiltrated as a movie torrent on The Pirate Bay torrent tracker.The Windows shortcut that...
programming code

Inside the “Hack” Programming Language

“Hack” is a programming language developed some years ago by a team of Facebook engineers who wanted to enhance their daily efficiency by increasing...

North Korean Hackers Still Highly Active Despite Trump’s Meeting with Kim Jong-un

Despite U.S. President Donald Trump's meeting with Kim Jong-un, numerous European and American businesses are still under attack by hackers in North Korea.The attacks...

WikiLeaks Website Infiltrated By OurMine

The notorious cyber group OurMine is back at it, and it has now infiltrated Julian Assange’s notorious whistle-blowing website WikiLeaks.The hack was made to...

How to Become a Professional Hacker — 10 Credible Tips for Beginners

Anyone can write up an outlandish cyberpunk username and pose as a hacker. However, there is so much that goes into becoming a professional...

Hacking in the Aviation industry

In the wake of increased cybercrime, we see that the threat of hackers gaining control over planes in motion is indeed possible.In some documented...
DNS ddos attack

DNS Hijacking: What Is It And How It Can Affect You?

DNS hijacking, also known as silent server swaps, is a malicious attack vector that can be used to forcibly redirect web traffic to websites...

Azorult Malware Advertised for Sale on Darknet Forums

Cybercrime has been greatly assisted by the free sale of hacking tools via the dark web.Recently, an updated version of Azorult, a type of...

Russian Darknet Hacker Extradited to US from Bulgaria

One of the eight hackers accused of false advertising schemes on the dark web in November 2018 has now been extradited to the United...
Domain name choice concept. Knob switch button and website internet domain names

DNS Spoofing Explained

In simple terms, the act of diverting an internet user to a false IP address is called DNS spoofing.Some in the trade call it...

Darknet Vendor Is Selling Stolen Data from Major Crypto Exchanges

A vendor from the darknet site Dread recently confirmed he is selling KYC (know-your-customer) user data from largest cryptocurrency exchanges directly on the dark...

Darknet Cybercriminals Capitalize on Black Friday

“Black Friday,” or the day after Thanksgiving, has become an international consumer phenomenon, where buyers all around the world search the internet and brick-and-mortar...
water drops on the Hewlett Packard logo

HP is Installing Telemetry Bloatware Without Users’ Consent

Hewlett Packard (HP) is discretely installing a form of spyware known as telemetry bloatware without the consent of the owner of the desktop machine...

Mega Breach Leads to Circulation of 2.2 Billion Records in Hacking Forums

In January, a portion of breached databases from several sources was first identified by Troy Hunt, a well-known security researcher.As has been reported, the...

Cyber Espionage Increasingly Common Among Governments

In the wake of increased cyber activities among governments globally, it is no doubt that some countries will employ whatever technological means available to...
Pharming Alert on a Red Binary Danger Background

Pharming: Everything You Need to Know

Information Technology crime has become a well-established business where cybercriminals are mainly in for economic benefit.These malicious actors are increasingly using techniques that target...
Iranian hacker laptop with binary computer code and Iran flag on the screen. Internet and network security.

Iranian Hackers Target Israeli Citizens in Cyber Attack

State-sponsored hackers from Iran have targeted Israeli citizens who are believed to possess information regarding certain people of interest.ClearSky, a cybersecurity firm based in...
A woman hand holding Uber app showing on Samsung note 3 in the car

Dark Web Vendor Admits to Hacking 17 Companies Including Uber & Groupon

Grant West, a notorious U.K. cybercriminal, has admitted to a series of serious charges including fraud, hacking and selling drugs through the dark web.The...
travel agency website

Hong Kong Travel Agency Suffers Major Data Hack

Hong Kong is one of the world’s top tourist hubs. It’s an administrative center with an expanding threshold of businesses basing their headquarters in...

An Inside Look at US-China Relations Regarding Cybersecurity

The relationship between China and the United States has changed drastically over the last few years.The diplomatic understanding between these two countries has significantly...

Gaming Keyboards that Contain Keyloggers

Espionage is a vice that is put into practice at large by various parties intending to dig out more information or collect data due...
DNS word cloud

What is a DNS Rebinding Attack?

DNS rebinding is a Domain Name System-based attack on the codes embedded in a webpage.Through DNS rebinding, an attacker can compromise unpatched internal systems,...

New Advanced Malware Targeting Windows Computers Available on the Dark Web

There is new hacking tool making rounds in dark web forums reportedly capable of stealing data, mining cryptocurrencies and avoiding detection from anti-malware tools.The...

Researchers Claim Billion-Dollar Hacking Group FIN7 Is Still on the Loose

A notorious hacking group known as FIN7 is still targeting individuals and businesses, despite the recent arrest of three of its members.As is common...

Israeli Firm ‘Candiru’ Offers Cyberattack Services on the Dark Web

A recent report revealed that a cybersecurity company from Israel is offering phone and computer-spying services to customers on the dark web.The spying services...
Judges Gavel Computer Keyboard And Real Handcuffs On The Rough Brown Wood Table

Hacker Who Orchestrated Spear Phishing Attack Targeting Yahoo Accounts Pleads Guilty

A 22-year-old Canada-born hacker by the name of Karim Baratov has pleaded guilty to charges of assisting Russian federal officers in accessing hundreds of...

OurMine Releases Vevo Videos after Hack

The notorious hacking group OurMine is at it again, this time leaking Vevo videos and releasing 3.12 TeraBytes of data to the public.The group...
Online crime scene with a finger print left on backlit keyboard with Chinese flag on it

200 Million Japanese Users’ Data Sold on the Dark Web by Chinese Hackers

Hackers peddling stolen data on the dark web may not be something new. But a report suggests that one forum in the dark web...

Top 10 Online Scams You Should Know, And How To Avoid Them

Cybercrime is a very lucrative business. In fact, some studies say online scams are turning over more money than drug trafficking.So, if you are...
Crypto Currency Word Cloud

DUHK: A New Crypto Attack Discovered

The type of hacking attempts that take place in modern times overthrow every security claim and gain access to even the most impenetrable systems...

Thousands of Pakistani Bank Cards Are Available on the Dark Web

Group-IB, a Russian cybersecurity company, has revealed that there has been a new bundle of credit card data available for sale on the dark...

Hackers Are Using These Tools to Reel in New Victims

Illegal cyber operations have currently gained momentum as attackers have invested in a variety of hacking tools to use to attack people.These hacking tools...

Hacked ‘Fortnite’ Data Surfaces on the Dark Web

Recently, personal data belonging to players of the popular game Fortnite has appeared on the dark web.Hackers reportedly obtained the information from the system’s...

After Dream Market Announces Shutdown, Ransomware Distributors Turn to Google Ads

With the recent shutdown of another prominent dark web market, the ransomware supply chain faced disruption.After the fall of Silk Road back in 2013,...
Uber building

Data Breach at Uber Technologies Affects Approximately 57 Million Persons

For more than a year now, Uber Technologies has remained mute about a massive breach at the tech firm where hackers obtained personal details...
transporting system

DDoS Attack Halts Swedish Transport Systems

A distributed denial of service has hit the Sweden transport system, specifically its train network. This has rendered delays in some areas to access train services, all as a result of automated booking and other services.

Email Validation Service Verifications.io Leaks Personal Records of 2 Billion Users

Once again, researchers have uncovered yet another leaked database containing a vast set of personal data. This latest discovery was unearthed by Bob Diachenko,...
The homepage of the official website for the Reddit social news website, on 20th April 2017.

Reddit Hit by Security Breach, User Data Exposed

Reddit has recently revealed that it suffered a security breach which subsequently exposed substantial user data.Confirming the incident through an official statement, Reddit Chief...
Exclusive Interview Microphone Questions Answers Show 3d Illustration

Exclusive Interview with Commander X

Christopher Doyon, more commonly known by the pseudonym Commander X, has been one of the hacktivist communities’ more public figures in recent years, known...

Australian Navy Shipbuilder Targeted by Iranian Hackers

Australian defence shipbuilder Austal recently announced that they had experienced a cybersecurity breach in their data management system.There was no known suspect at the...

6,500 Darknet Sites down After Hosting Service Gets Hacked

The users of the dark web have a lot fewer sites to visit. Hackers recently took control of about 6,500 darknet sites.These attackers targeted...
Cyber crime hand reaching out through laptop computer

10 Signs You’ve Been Hacked – and What to Do Next

While getting hacked has become almost as common as breathing, it is not easy to tell when your computer has been compromised. Fraudsters are...

Send this to a friend