More Than 33000+ Telnet Credentials of IoT Devices Leaked Online

More Than 33000+ Telnet Credentials of IoT Devices Leaked Online

Have you set your IP address to a mere 123456 or admin?  Keep your eyes peeled then.  You might fall prey to a destructive...
Find Loopholes in iPhone and Get $1,500,000; Hack Telegram, WhatsApp and Get $500,000: Zerodium

Find Loopholes in iPhone and Get $1,500,000; Hack Telegram, WhatsApp and Get $500,000: Zerodium

An American information security firm, Zerodium has announced big financial rewards for zero-day exploits.  Now, it’s time that the security researchers and hackers can...
CIA Along With Its Partner Agencies Collected User's Biometric Data: Wikileaks' Vault 7

CIA Along With Its Partner Agencies Collected User’s Biometric Data: Wikileaks’ Vault 7

Another covert information collection tool used by the CIA surfaces.  It goes by the name ExpressLane.  What is interesting is that the CIA exploits...
Chinese Hackers Are Using 'Game of Thrones' Leaks for Phishing via Emails

Chinese Hackers Are Using ‘Game of Thrones’ Leaks for Phishing via Emails

The Game of Thrones fantasy might have hooked you to its latest updates now and then.  Along with the episodes, you might have as...
For Treason & Helping CIA, Three FSB Agents & a Kaspersky Labs Employee Arrested in Russia

For Treason & Helping CIA, Three FSB Agents & a Kaspersky Labs Employee Arrested...

The mystery behind the arrest of Russian officials in early January has now transpired.  The three FSB agents and a Kaspersky Labs employee had...
Ransomware Developing Tools Are on Sale, Can be Used Even With Basic Skills

Ransomware Developing Tools Are on Sale, Can be Used Even With Basic Skills

You might be using your Android apps to play games, download movies and books, banking and many more.  But the same is now being...
Basic DMARC Email Protection Is Used by Only 39 Fortune 500 Companies

Basic DMARC Email Protection Is Used by Only 39 Fortune 500 Companies

Phishing attacks are on an upswing.  More than 91 percent of data breaches begin with phishing acts.  Many corporate and government data have been...
'Lionel Messi Joining Real Madrid', Posted via Team's Hacked Twitter Account

‘Lionel Messi Joining Real Madrid’, Posted via Team’s Hacked Twitter Account

The supposedly white hat group, OurMine is targeting high profile social media accounts lately.  The newest victim of this cyber-attack was Barcelona’s star player...
‘Joao’, the New Gaming Malware, Is Targeting Gamers Worldwide

‘Joao’, the New Gaming Malware, Is Targeting Gamers Worldwide

You might be addicted to gaming.  But the virtual criminals seek out their lucrative affairs through your online games.  The silent attack comes forth...
Chinese Hacker Arrested by FBI for Distributing Malware in 2015 OPM Breach

Chinese Hacker Arrested by FBI for Distributing Malware in 2015 OPM Breach

The U.S. OPM had suffered a great setback with a cyber infringement incident reported in 2015.  The Office of Personal Management (OPM) data breach...
Hackers Installing Malicious Tools via Video Links in Facebook Messages

Hackers Installing Malicious Tools via Video Links in Facebook Messages

You might be using your Facebook chats to connect with your friends.  But hackers are using “your” Facebook chats to spread malware.  Yes, it...
'Game of Thrones' Final Episode Leaked by HBO Hackers: Reports

‘Game of Thrones’ Final Episode Leaked by HBO Hackers: Reports

Season 7 of the Game of Thrones draws to a close on this Sunday.  It appears that the HBO hackers have ended up the...
Finnish Court Ordered The Pirate Bay Founders to Pay $477,800 to Record Labels in Compensation

Finnish Court Ordered The Pirate Bay Founders to Pay $477,800 to Record Labels in...

Copyright infringement lands the Pirate Bay co-founders under heavy reparation.  World’s most popular torrent website have lost over the lawsuit to a group of...
500+ Android Apps With 100Mn+ Downloads on Google Play Store Found Malicious

500+ Android Apps With 100Mn+ Downloads on Google Play Store Found Malicious

Android apps on Google Play Store can turn your handset as a spying agent.  More than 500 million apps were observed to be infected...
Hackers Attacked Enigma Blockchain Project, $500K Worth of Ether Stolen

Hackers Attacked Enigma Blockchain Project, $500K Worth of Ether Stolen

A cryptocurrency project gives away $500000 to smart hackers.  The attackers could not have found a better smuggling space than a start-up crowdfunding platform. ...
ManU Star Footballer Romelu Lukaku's Instagram Account Hacked, Cristiano Ronaldo Trolled

ManU Star Footballer Romelu Lukaku’s Instagram Account Hacked, Cristiano Ronaldo Trolled

Instagram hacks have been on a rise.  Especially, it seems that the cyber punks are particularly targeting celebrity star’s accounts.  A recent story goes...
Intelligent & Powerful Machines Can Be Hacked for Murders & Spying: Reports

Intelligent & Powerful Machines Can Be Hacked for Murders & Spying: Reports

Ever heard of hackable robots?  Or psychotic robots?  What about spy or slaying robots?  Studies show that the much-adored humanoid forms can be hijacked...
After HBO, 'OurMine' Now Claims to Hacked Into SONY PlayStation's FB and Twitter Account

After HBO, ‘OurMine’ Now Claims to Hacked Into SONY PlayStation’s FB and Twitter Accounts:...

Sony faces cyber interference again.  After a major blow in 2011, the current one seems to again question its highly debated security issues.  The...
iOS 11 Can Protect Against iPhone 7's Passcode Brute Force, Claims Apple

iOS 11 Can Protect Against iPhone 7’s Passcode Brute Force, Claims Apple

Heard of the $500 device that hacks your iPhone 7?  No need to break out in cold sweat, though.  If there are problems, there...
Game of Thrones Hackers Now Warns Against E6, E7 & Social Account Detail's Leak

Game of Thrones Hackers Now Warns Against E6, E7 & Social Account Detail’s Leak

Waiting for the finale of Game of Thrones?  Well, it seems HBO need not take up further pain, as the hackers are managing it...
University of Washington Researchers Successfully Hacked Into Computer Using DNA

University of Washington Researchers Successfully Hacked Into Computer Using DNA

Until now, DNA was known to carry genetic information for growth and development.  Could you imagine the same deoxyribonucleic acid to act as a...
Russian Hackers, Turla APT Group, Targeting G20 Participants for Cyber-Espionage

Russian Hackers, Turla APT Group, Targeting G20 Participants for Cyber-Espionage

The well-known notorious advanced persistent threat (APT) group Turla is currently targeting G20 attendees.  Believed to of Russian origin, they are conducting a campaign...
Non-Banking Apps Are New Target of Android Trojan Which Was Targeting Banking Apps

Non-Banking Apps Are New Target of Android Trojan Which Was Targeting Banking Apps

Do you cling onto the custom of booking taxis/flights/tickets using your Android devices?  Then you should be on your guard.  As of late, cyber...
Hacker Leaks Apple iOS Secure Enclave Firmware's Decryption Key

Hacker Leaks Apple iOS Secure Enclave Firmware’s Decryption Key

The rising cyber-crimes have made the secure seem insecure.  Apple is the latest target to such security breach.  To say, Apple had paved the...
HBO Regains Its Twitter Handle After OurMine's Successful Attack

HBO Regains Its Twitter Handle After OurMine’s Successful Attack

Each day is a new beginning with new thoughts.  But unfortunately, for HBO each day dawns as a rude awakening.  The hackers are not...