Razer BlackShark V2 SE

Razer Gaming Company Left Users’ Personal Data Exposed To Hackers For...

Gaming hardware vendor Razer has accidentally exposed personal information of over one lakh gamers that was available for nearly a month for hackers to...
telemarketing fraud

How To Avoid Telemarketing Fraud And Unwanted Calls?

You’re just about to sit down at the dinner table when your phone goes off, again. It seems like no matter how many times...
iphone smart lock

Here’s Why You Need A Home Security System If You Don’t...

The popularity of home security systems is on the rise and we can spot plenty of home security providers offering their services throughout the...
bitcoin computer

US Researchers Discover Cryptocurrency Trojan In 306 Popular Android apps

A team of US researchers has developed a tool that can find cryptocurrency bugs in Android apps. Using the tool, they discovered crypto...
Paytm Mall Online Shopping

Paytm Mall Allegedly Hacked, Company Denies Claims

Online intelligence firm Cyble on Sunday said that a cybercrime group demanded ransom after gaining unrestricted access to the entire databases of Paytm Mall,...
google drive logo

Google Drive Flaw Discovered That Hackers Can Exploit

Hackers could exploit an unpatched flaw in Google Drive to distribute malicious files disguised as legitimate files on systems worldwide. The Hacker News reports that...
big data analytics

How To Protect Your Devices And Digital Footprint Against Big-Data Companies?

As we venture further into the future we come to realize that the more we get connected through the internet, the more data-prints we...

WHOIS History As A Data Source For Cybercrime Investigations

Cybercriminals are quite an elusive lot. Some cyberattacks have caused victims to lose much money and remained a puzzle to cybercrime investigators for long...
bitcoin

Securing Your Cryptocurrencies: Risks & Strategies

Although blockchain technology and cryptocurrencies offer a uniquely secure way to make payments and transactions, the crypto world is not without its risk factors....
Stock Image

Cybercriminals Using Legitimate Tools to Hack into Computers

Cybercriminals widely use software developed for normal user activity, administrator tasks and system diagnostics to avoid getting caught quickly after carrying out their attacks,...
ransomware

Top 3 Ransomware Examples You Should Know

Have you ever heard of holding something for ransom? Perhaps you’ve seen stories on the news of valuable items being stolen, with a return...
Samsung Galaxy S10 Leak

Twitter Says Security Flaw in its Android App Exposed Private User...

After facing a mega crypto hack last month, Twitter acknowledged on Wednesday that it has discovered and fixed a security vulnerability in its app...
bitcoin

Teen Who Hacked Twitter Has $3 Million in Bitcoin

The Florida-based juvenile who is the mastermind of the mega Twitter Bitcoin hack owns more than $3 million (over Rs 22.5 crore) worth of...
Home Made Face Mask Cloth Mask

Cybercriminals Using Covid-Related Phishing Emails to Steal Personal Data

Online sale of fake medical supplies, drugs and personal protective equipment, and exploitation of teleconference tools are the major Covid-19 cybercrime trends in Asia,...
twitter

One Juvenile Among 3 Charged for Twitter Hack of Famous Celebs

The US Department of Justice has charged three young individuals (including one juvenile) with hacking Twitter last month that compromised the accounts of 130...

TOP STORIES