hacking

What You Can Learn from 2018’s Worst And Biggest Two Data Breaches?

With 5 billion records exposed in 6,515 data breaches in 2018, it was the second most active year for publicly exposed breaches after 2017, reports Risk Based Security (RBS) in its The Year End 2018 Data Breach QuickView Report. Among...

iPhone Under Attack: Getting Hacked Just By Visiting Websites!

Yes, you read it right, a website could hack iPhone. In January this year, it was the very first time when Apple disclosed that active install base of iPhone has reached 900 million. With...

Is AI in Cyber Security a New Tool For Hackers in 2019?

The use of Artificial Intelligence has helped IT professionals to predict and react to cyber attacks quicker than ever before. AI seems to have taken over everything from ordering food at a restaurant, speech recognition and task automation. One...

Hackers Now Using Google Translate To Trick Internet Users

Cybercriminals are getting smarter with every passing day. This time, hackers are trying to lead internet users to phishing websites through Google Translate. Hackers and cybercriminals keep upping their game and coming up with newer, ingenious methods every now and then...

Apple Servers Hacked: Authorises Keys To Validate Users Leaked

The management of the world's most valuable company must be embarrassed enough for the incident that took place last year - Apple servers were hacked by a 16-year-old high school student. Apple servers, which are widely believed to be...

Instagram Hacked: Millions Of Users Locked Out Of Their Account

First things first; Instagram is hacked! Millions of Instagram users across the world are suspecting about the possible hack of their Instagram account, possibly the result of so-called spam bot attack. In the last few hours, the number of complaints is...

Google Bug Bounty Program Awards Teen $36,000

Cyber-crime is one oft-repeated threat, which apparently doesn't seem like slowing down. However, the only defence to this threat is security vigilance and awareness. A quick way to test the corresponding security measures is by incorporating bug bounty programs which...

The Remote Hacking of Android Phones Is Possible By GLitch

Android's vulnerability is not something unfathomable. Despite, security researchers have finally discovered an effective way to hijack an Android phone remotely through a nearly four-year-old hacking technique known as 'Rowhammer'. On Thursday, researchers from Vusec research group published a...

Hackers Accessed Casino’s High-Roller Database Through A Fish Tank

In the era of mobile devices and the internet, the increasing dependency of businesses on emerging technologies is not surprising enough. Companies are not shying from employing next-generation technologies to safeguard their business and their customers. Despite all such...

Is Your Android Smartphone Secure From Hacking And Theft?

Whether you are a wizard with your brand-new smartphone or not, there is a certain level of security that you are going to have to understand to keep information safe on your Android smartphone. Today, being connected to the...
- Advertisement -

Latest News

- Advertisement -

Subscriber Base of India’s Top 10 ISPs by Quarter

The above graph represents the subscriber base of India's...

Number of Broadband Subscribers In India, by Type

The above graph represents the number of broadband subscribers...

India Top 5 Smartphones Share by Month

The above table shows India's top 5 smartphone models share by month. With...

Triple+ Camera Smartphone Penetration Rate, by Brand

The above graph represents Triple Camera penetration by brands...