Cyber Security News highlights this week A 19-year-old George Duke-Cohan teen hacker arrested for performing a DDoS attack on ProtonMailA new phishing attack is targeting WordPress sites to get user credentialsThe World’s Favorite Airline “British Airways” has confirmed a data...
Artificial Intelligence is a present scenario de facto standard. It would be hard-pressed to identify an application where AI has no presence. Data organization, Cybersecurity, Speculations, Financial predictions, Knowledge extraction… The list is endless. But, do remember, just like AI...
Cyber Security News highlights this week In-Short Overview: Air Canada had detected unusual log-in behaviour between August 22 and 24, during which the personal information for some of its customers “may potentially have been improperly accessed”. On August 29, Air...
Cyber Security News highlights this week In-Short Overview: The remote code execution vulnerability CVE-2018-11776 in Apache Struts affects Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and potentially unsupported versions of the popular Java framework. Experts warned that this flaw...
DDoS attacks continue to be one of the most targeted attack vectors to counter. The range of attack methods is growing and diversifying as a prebuilt toolkit, and even DDoS attack services, are made more readily available. Here are a...
Cyber Security News highlights this week In-Short Overview: Hackers stole Rs 94 crore ($13.5 Million) from one of the largest Indian co-operative Cosmos banks. In two days, hackers withdrew a total Rs 78 crore from various ATMs in 28 countries,...
Cyber Security News highlights this week Vulnerability present in WhatsApp messenger is Allowing Attackers to Alter. Messages in Group ChatsThe source code of Snapchat app leaked on GitHubHealth Care Data of 2 Million People is exposed online in MexicoHackers Infected...
Cryptojacking is a technique used by hackers to make unauthorized use of the user’s browser to mine cryptocurrency. Cryptojacking is usually implemented by hackers by either of two ways: How do Hackers Perform Cryptojacking? How to Prevent Cryptojacking? In order...
Cyber Security News highlights this week In-Short Overview: Yesterday, Facebook announced that it had shut down 17 Facebook accounts, 8 Facebook pages, and 7 Instagram profiles for what the social network categorized as “coordinated inauthentic behaviour”. Read More: Facebook Removed...