Home Search

cyber attack - search results

If you're not happy with the results, please do another search
Zynga Words with Friends became the victim of Cyberattack, 218 million player account information stolen

Zynga Words with Friends became the victim of Cyberattack, 218 million player account information...

0
Popular online game Zynga Words with Friend suffered a huge data breach distressing more than 200 million accounts. It was identified that many of the player's account information have been compromised due to illegal...
Social media giant Telegram released 127 new stickers along with People Nearby 2.0 feature

Telegram messenger attacked by a massive cyber-attack DDoS

3
The popular encrypted messaging service Telegram is once again being hit with a distributed denial of service (DDoS) attack in Asia, as demonstrators in Hong Kong take to the streets. People in Hong Kong took the street...
Top must-have security software you must install on your new PC or laptop

What is a nation-state Attack? This is how Microsoft is helping preventing it 

0
In the past five years, there has been a significant increase in malicious cyber activity. The advent of nation-states using cyber-attacks has led to the emergence of new security threats against which every network...
agent smith malware

Beware! Virtual-meeting apps a top target for cyber-threats: Kaspersky

0
As more and more people are staying at home during the Coronavirus outbreak, Kaspersky experts have investigated nearly 1300 files that have names similar to popular virtual-meeting applications like Zoom, Webex, and Slack. The researchers...
EA Origin account takeover

Check Point Research and CyberInt finds a big vulnerability in EA’s Origin gaming client,...

0
Electronic Arts (EA) is the second largest gaming company in the world with popular titles under its name like FIFA, NFL, UFC, Battlefield, Medal of Honor, NFS and so on. The company has more...
Ethical-Hacking

6 things that make ethical hacking a great career

0
Ethical hacking is not your next-door profession. It is technical, exciting, adventurous and promising. Ethical hackers are the people who are licensed to hack. They hack to protect, not to destroy. You must have...
Top must-have security software you must install on your new PC or laptop

Top must-have security software you must install on your new PC or laptop

0
Data is considered as the modern currency. It's not only about information but your identity as a whole. When your information gets compromised, your social and financial base gets eroded. Thus, protecting your data...
foldable phone

Are Foldable Phones Worth the Money?

0
The last few years of smartphone upgrades have gotten pretty dull for consumers. Sure, cameras have gotten better, processing speed is faster, and devices are slimmer. But a phone released in 2019 isn’t much...
mozilla firefox

Mozilla has asked all Firefox users to update to the latest version as soon...

0
Popular web browser Mozilla Firefox recently found a zero-day vulnerability in its platform. After discovering the vulnerability, Mozilla has asked all the Firefox users to update their web browser to the latest version immediately....
facebook

Facebook won’t combine all its messengers this year

0
Recently, we have come to know that Facebook will be launching the end-to-end encryption and combine all its messaging platforms into one. This would lead to the integration of WhatsApp and Instagram with Facebook....
Facebook and CBSE come together to launch a curriculum on AR and digital safety for secondary school students

Facebook Messenger, Instagram and WhatsApp might get integrated

0
In a new move made by Facebook, Mark Zuckerberg is planning to integrate Facebook Messenger, WhatsApp and Instagram together. This is going to happen by end-to-end encryption of all three apps. This move, as...
Secure Your PC

5 best ways to secure your Windows PC in 2021

0
We use our Windows PCs every day for work and business, and we often do not think about the risks involved. Cybercrime has grown from where it was a decade ago. New risks have...
Hackers are using SEO to deliver malware: What is it and how to safeguard yourself

Hackers are using SEO to deliver malware: What is it and how to safeguard...

0
Hacking is a process of gaining unauthorised access to someone's profile, a computer network, or a website. With the advancement of security mechanisms, the tactics of cyberattacks are also evolving. Nowadays, hackers are using...
How do hackers use SEO to deliver malware?

How to spot a phishing email or SMS message and avoid it?

0
Scammers are spread across the web to get unauthorised access to profiles, inboxes, and financial accounts. It may be possible that you receive fake emails asking you to furnish sensitive information. Phishing is one...
10 games to play on the new Xbox Series X and S

10 games to play on the new Xbox Series X and S

0
The year 2021 is likely to be the year of Xbox Series X and Xbox Series S as Microsoft is committed to enhancing the Xbox console ecosystem. The Xbox Game Pass Ultimate allows you...
BigBasket data breached of over 2 crore users, up for sale on the dark web

BigBasket data breached of over 2 crore users, up for sale on the dark...

0
Indian online groceries unicorn Big Basket encountered a major data breach last month in October letting data of around 2 crore users put on sale on the dark web. The data included personal information...
Avast alerts Google of 21 adware gaming apps on Play Store: Report

Avast alerts Google of 21 adware gaming apps on Play Store: Report

0
Rendering to a research done by the antivirus firm Avast 21 adware gaming apps on Google’s Play Store. After taking this into account the researcher has reported Google reportedly Google is still investigating and...
agent smith malware

Google Drive security issue could disguise malicious files into legitimate documents

0
In the "manage versions" functionality that is being offered by Google Drive, the news is rife that hackers can now trick into unpatched security weakness to distribute malicious files that seemingly appear to be...
hacking

9 highly-important email security tips you must practice

0
While Internet offers access to a world of products and services, entertainment and information, it also provides platform to scammers, hackers, and identity thieves. Email remains the main route for data leakage. Here are...
5 best VPN services to help you protect personal information online

5 best VPN apps to help you safeguard personal information online

0
In today’s time of increasing cybercrime, virtual private network (VPN) is seen as a tool that’s providing protection for your personal information more than anonymity. In case you are accessing a public Wi-Fi hotspots,...
The government launches Say Namaste app as an alternative to Zoon app

The government launches Say Namaste app as an alternative to Zoom app

0
In order to take on Zoom video conferencing app  Indian government has launched an alternative to the app called Namaste. Basically it is not an app, it is a video conferencing platform which has...
Google to delete inactive Google accounts starting June 1, 2021

Everyday Gmail is blocking more than 100 million phishing emails related to COVID-19

0
The software tech giant Google on Friday revealed that in the past one week it has blocked more than 18 million malware as well as phishing emails all related to COVID-19. According to the...
The Indian Government asks employees to refrain from using the Zoom app

The Indian Government asks employees to refrain from using the Zoom app

0
Earlier this week Federal cyber-agency CERT-In released an advisory for the increased cyber-attacks on virtual private networks being utilised by various companies to make working from home easier in view of the lockdown. Soon...
India Security researcher grabbed 75 lakhs for discovering a critical vulnerability in the Sign in Apple account

Apple becomes top most web phishing victim in Q1 2020

0
As people are spending more time on their mobile phones and laptops to stay connected during the Coronavirus pandemic, cybercriminals are utilising this period to carry out phishing attempts. A Brand Phishing Report for...
As Houseparty and Zoom gains popularity, user’s accounts are being hacked

As Houseparty and Zoom gains popularity, user’s accounts are being hacked

0
As the pandemic coronavirus spread is on a rise it has almost paralyzed the whole world as well as the tech industry. To combat the situation office goers have been asked to stay home...

STAY CONNECTED

120,329FansLike
8,924FollowersFollow
4,873FollowersFollow