We have become all familiar with the type of hacker who leverages their technical expertise to penetrate protected IT and digital systems and compromise sensitive data. We hear about this type of hacker in the news regularly, and we are motivated to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of hacker who can use…
Tor is hugely popular among internet users who wants to remain anonymous while browsing various website. People who are concerned about invasion of their privacy uses tor along with different VPN solution. The least one can expects Tor to do is hide their original IP address while using internet. So it may come to you as surprise, a recent vulnerability has been found in Tor,…
If you are a GOT (Game of Throne) Fan, there is a good chance that you already know the story. Hackers have recently hacked into HBO network and stole valuable data such as episodes of TV-shows along with scripts, and documents containing employee information. They allegedly have stolen data of few TeraBytes from HBO network. Subsequently dropped upcoming episodes of very well-known TV series such as Ballers and Room…
A new malware has been revealed by “Check Point” recently which has attacked more than 15 million android device around the world, rooting phones and hijacking apps to make millions in fraudulent ad revenue. The name of this catastrophic Cyber threat for Android is ‘CopyCat’. How Your Phone Gets Affected? CopyCat impersonate itself a popular application on Third Party App Store that people are downloaded…
It is 2017, and opening a simple document file may compromise your system! We are witnessing an ongoing multi-phase ransomware attack all around the world. It may get even worse! A zero-day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is…