gadget-bridge
Home Search

cyber attack - search results

If you're not happy with the results, please do another search
Norton reports 4 in 5 gamers in India have experienced a cyberattack

Norton reports 4 in 5 gamers in India have experienced a cyberattack

0
According to the latest survey done by NortonLifeLock more than 4 in 5 Indian gamers have experienced a cyberattack. The survey has been conducted by The Harris Poll. In India, 75 percent of Indian...
Zynga Words with Friends became the victim of Cyberattack, 218 million player account information stolen

Zynga Words with Friends became the victim of Cyberattack, 218 million player account information...

0
Popular online game Zynga Words with Friend suffered a huge data breach distressing more than 200 million accounts. It was identified that many of the player's account information have been compromised due to illegal...
Social media giant Telegram released 127 new stickers along with People Nearby 2.0 feature

Telegram messenger attacked by a massive cyber-attack DDoS

3
The popular encrypted messaging service Telegram is once again being hit with a distributed denial of service (DDoS) attack in Asia, as demonstrators in Hong Kong take to the streets. People in Hong Kong took the street...
How to use the new 'Checkout with Crypto' feature?

Top Crypto Attacks and Why They Happened

0
Today, cryptocurrency has become a well-known technology. It is interesting cause even those who are not directly related to the field know about it. Although, it is famous not only for its cutting-edge technologies....
How to prevent a ransomware attack? What to do in case you are hit by ransomware?

How to prevent a ransomware attack? What to do in case you are hit...

0
Ransomware is a form of malware that gains access to your system and then locks you out of your computer until you pay a ‘ransom’ to gain back control. Ransomware can creep into your...
Alert! Alert! Hackers in China are using the VLC media player to launch malware attacks

Alert! Alert! Hackers in China are using the VLC media player to launch malware...

0
According to the latest cybersecurity report VLC media player is being used by Chinese hackers to launch malware attacks on users. In a wide-ranging and sustained campaign, the hacking group Cicada is using VLC...
Top must-have security software you must install on your new PC or laptop

What is a nation-state Attack? This is how Microsoft is helping preventing it 

0
In the past five years, there has been a significant increase in malicious cyber activity. The advent of nation-states using cyber-attacks has led to the emergence of new security threats against which every network...
Malware alert: CERT-In cautions Indian Bank users of Drinik Android Malware promising Income tax refunds

Beware! Virtual-meeting apps a top target for cyber-threats: Kaspersky

0
As more and more people are staying at home during the Coronavirus outbreak, Kaspersky experts have investigated nearly 1300 files that have names similar to popular virtual-meeting applications like Zoom, Webex, and Slack. The researchers...
EA Origin account takeover

Check Point Research and CyberInt finds a big vulnerability in EA’s Origin gaming client,...

0
Electronic Arts (EA) is the second largest gaming company in the world with popular titles under its name like FIFA, NFL, UFC, Battlefield, Medal of Honor, NFS and so on. The company has more...
ssl security

WordPress Security Tips and Best Practices Every Site Owner Should

0
Among all other CMS, WordPress is one of the most prominent CMS used for developing websites and blogs. On that note, WordPress security is one of the essential aspects every website owner should know....

High Tech Surveillance Gadgets That Protect the Gaming Operators

0
The nature of the casino environment, where countless people mingle and large sums of money change hands, demands the best quality security. Brick-and-mortar casinos are home to some of the world’s most advanced surveillance...
Ethical-Hacking

6 things that make ethical hacking a great career

0
Ethical hacking is not your next-door profession. It is technical, exciting, adventurous and promising. Ethical hackers are the people who are licensed to hack. They hack to protect, not to destroy. You must have...
Top must-have security software you must install on your new PC or laptop

Top must-have security software you must install on your new PC or laptop

0
Data is considered as the modern currency. It's not only about information but your identity as a whole. When your information gets compromised, your social and financial base gets eroded. Thus, protecting your data...
foldable phone

Are Foldable Phones Worth the Money?

0
The last few years of smartphone upgrades have gotten pretty dull for consumers. Sure, cameras have gotten better, processing speed is faster, and devices are slimmer. But a phone released in 2019 isn’t much...
mozilla firefox

Mozilla has asked all Firefox users to update to the latest version as soon...

0
Popular web browser Mozilla Firefox recently found a zero-day vulnerability in its platform. After discovering the vulnerability, Mozilla has asked all the Firefox users to update their web browser to the latest version immediately....
facebook

Facebook won’t combine all its messengers this year

0
Recently, we have come to know that Facebook will be launching the end-to-end encryption and combine all its messaging platforms into one. This would lead to the integration of WhatsApp and Instagram with Facebook....
Facebook and CBSE come together to launch a curriculum on AR and digital safety for secondary school students

Facebook Messenger, Instagram and WhatsApp might get integrated

0
In a new move made by Facebook, Mark Zuckerberg is planning to integrate Facebook Messenger, WhatsApp and Instagram together. This is going to happen by end-to-end encryption of all three apps. This move, as...

Safety Tips to Remember When Playing Online Poker

0
Online poker has reached a new height of popularity these days. Since it provides convenience and accessibility to players across the world, more and more players are joining this digital platform. However, just like...
AMD Zenbleed

AMD ‘Zenbleed’ bug is enabling hackers to steal data from Ryzen CPUs

0
With the latest technological advancements in the modern world, cybercrime is on the rise as well. People are becoming more and more dependent on technology for their daily activities. In recent years researchers have...
Android malicious bank account

Android users are being tricked into installing malicious bank account apps: Best 5 ways...

0
The increasing technological advancements also pose a potential risk of cybercrimes. People are becoming more dependent on technology for their daily needs leading to a stark rise in cybercrimes. As per reports, around 94%...
Acer introduces the Swift Edge, the world's lightest 4K OLED laptop in India

Acer introduces the Swift Edge, the world’s lightest 4K OLED laptop in India

0
Acer Swift Edge was introduced in India. It is claimed to be the lightest 16-inch OLED laptop in the world. It is powered by AMD Ryzen 7 6800U processor, which has eight cores and...
BenQ introduces the EH620, the world's first smart projector powered by Windows, in India

BenQ introduces the EH620, the world’s first smart projector powered by Windows, in India

0
The first smart window projector in the world, the EH620, was unveiled by BenQ. The projector is powered by the most recent Intel Processor 4000 Series CPU. The device offers a 150-inch Full HD...
A critical flaw made iPhone and iPad devices extremely vulnerable, CERT-In issued an advisory for users

A critical flaw made iPhone and iPad devices extremely vulnerable, CERT-In issued an advisory...

0
The use of Apple's iPhone and iPad may be dangerous as a number of serious security vulnerabilities have been discovered by Indian Computer Emergency Response Team (CERT-In). The faults appeared to be of a...
Indian authorities alert Apple Watch models running watchOS versions older than 8.7 have vulnerabilities

Indian authorities alert Apple Watch models running watchOS versions older than 8.7 have vulnerabilities

0
The Indian government has warned that Apple Watch users have a number of security flaws. According to the Indian Computer Emergency Response Team (CERT-in) Apple Watch models running watchOS versions older than 8.7 have...
Child-Safety-online

A Guide to Keep Child’s Online Safety

0
As the digital world is expanding, the incidences of cybercrimes are also increasing. We must maintain the dignity of the online community while safely accessing the internet. While the chances of occurrence of these...

You cannot copy content of this page