hacking

iPhone Under Attack: Getting Hacked Just By Visiting Websites!

Yes, you read it right, a website could hack iPhone. In January this year, it was the very first time when Apple disclosed that active install base of iPhone has reached 900 million. With a global active installed base is...

Is AI in Cyber Security a New Tool For Hackers in 2019?

The use of Artificial Intelligence has helped IT professionals to predict and react to cyber attacks quicker than ever before. AI seems to have taken over everything from ordering food at a restaurant, speech recognition and task automation. One...

Hackers Now Using Google Translate To Trick Internet Users

Cybercriminals are getting smarter with every passing day. This time, hackers are trying to lead internet users to phishing websites through Google Translate. Hackers and cybercriminals keep upping their game and coming up with newer, ingenious methods every now and then...

Apple Servers Hacked: Authorises Keys To Validate Users Leaked

The management of the world's most valuable company must be embarrassed enough for the incident that took place last year - Apple servers were hacked by a 16-year-old high school student. Apple servers, which are widely believed to be...

Instagram Hacked: Millions Of Users Locked Out Of Their Account

First things first; Instagram is hacked! Millions of Instagram users across the world are suspecting about the possible hack of their Instagram account, possibly the result of so-called spam bot attack. In the last few hours, the number of complaints is...

Google Bug Bounty Program Awards Teen $36,000

Cyber-crime is one oft-repeated threat, which apparently doesn't seem like slowing down. However, the only defence to this threat is security vigilance and awareness. A quick way to test the corresponding security measures is by incorporating bug bounty programs which...

The Remote Hacking of Android Phones Is Possible By GLitch

Android's vulnerability is not something unfathomable. Despite, security researchers have finally discovered an effective way to hijack an Android phone remotely through a nearly four-year-old hacking technique known as 'Rowhammer'. On Thursday, researchers from Vusec research group published a...

Hackers Accessed Casino’s High-Roller Database Through A Fish Tank

In the era of mobile devices and the internet, the increasing dependency of businesses on emerging technologies is not surprising enough. Companies are not shying from employing next-generation technologies to safeguard their business and their customers. Despite all such...

Is Your Android Smartphone Secure From Hacking And Theft?

Whether you are a wizard with your brand-new smartphone or not, there is a certain level of security that you are going to have to understand to keep information safe on your Android smartphone. Today, being connected to the...

The Leaked Source Code of Windows 10 Could Cause Serious Damages to the OS Users

Last week was a nightmare for the top executives of the world's largest software company Microsoft Corporation (NASDAQ:MSFT). In a shocking incident, a chunk of the source code of Windows 10 was leaked online. The data, which consisted of...

Latest News

Facebook’s Content Censorship Policies Are Broken, And It Must Be Fixed ASAP!

Facebook's very own independent content oversight board has testified about the social media behemoth's content moderation shortcomings! Michael McConnel, the...