News and Updates
Insulting comments in Instagram
Earlier this year one of the most popular Instagram applications launched a new feature. Its main task is to analyze written comments and warn the…
Top 7 Cyber Security Threats to Watch Out For
While it might seem obvious to some, many might wonder: why even bother making a list of the most important cyber security threats? Experts certainly…
New tools to improve data security
The human factor has been and remains the “Achilles heel” of data hacking. Multi-factor authentication can be an important step towards establishing digital identity control…
WhatsApp refused to Hand over Data to Authorities of Hong Kong
A proxy war that has been initiated in Hongkong for freedom of expression over the internet. Hong Kong government officially requested to WhatsApp provides them…
A novel malware can steal passwords from VPN software and web browsers
Malware is designed to harm computers, clients, and network systems, etc. A new malware Agent Tesla has been updated with novel stealing modules. According to…
Three US and UK teenagers arrested due to their link with the Twitter hack
It was easy for law enforcement agencies to trace and identify the culprits behind the massive twitter hack attack. In this hack, hackers tried to…
A Dangerous Phishing Campaign Attack the Cloud Services
Phishing campaigns target the receivers with lure content and want to steal their personal information or necessary credentials. Hackers and cybercriminals use such creepy phishing…
Federal Communications Commission Forced to Unveil the IP Address of Sham Net Neutrality Comments
The Manhattan Federal Judge has ordered the FCC (Federal Communications Commission) to give access to the log server to the two investigators so that they…