A Ukrainian bank has become the latest victim of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT.
Hackers have reportedly stolen $10 Million from an unnamed bank in Ukraine by exploiting the SWIFT international banking system, according to an independent IT monitoring organization called the Information
After hacking Mark Zuckerberg’s Twitter and Pinterest accounts, Hacking group OurMine has successfully hacked the Quora account Google CEO Sundar Pichai and then cross-posted to his Twitter account.
<!– adsense –>
The hack became apparent when OurMine posted messages on Quora through Pichai’s account, which then appeared on his official Twitter feed late
Hey! Welcome to the United States. May we have your Twitter handle, please?
That’s exactly what you’ll likely be asked by the U.S. Customs and Border Protection at the airport prior to entering U.S. soil.
Yes, your Twitter handle may soon be part of the US Visa process as U.S. Customs and Border Protection has entered a new proposal into the federal register, suggesting a new field in which
We have heard a lot about ATM skimmers, but it’s nearly impossible to spot one.
Some skimmers are designed to look exactly like the card slot on the original machine and attached to the front, and others are completely hidden inside the ATM.
But, during his vacation in Vienna, Austria, cyber security expert Benjamin Tedesco spotted an ATM skimmer that was totally unrecognizable.
<!–
It’s not at all surprising that the Google Play Store is surrounded by a large number of malicious apps that has the ability to gain users’ attention into falling victim for one, but this time, it is even worse than most people realize.
Researchers at Trend Micro have detected a family of malicious apps, dubbed ‘Godless,’ that has the capability of secretly rooting almost 90 percent of all
Apple’s new iOS 10 recently made headlines after MIT Technology Review revealed that the company had left the kernel of the mobile operating system unencrypted.
Yes, the first developer preview of iOS 10 released at WWDC has an unencrypted kernel.
When the headline broke, some of the users were surprised enough that they assumed Apple had made a mistake by leaving unencrypted kernel in iOS
An Independent Security Researcher from Egypt has discovered a critical vulnerability in Uber app that could allow an attacker to brute force Uber promo code value and get valid codes with the high amount of up to $25,000 for more than one free rides.
Mohamed M.Fouad has discovered a “promo codes brute-force attack” vulnerability in the sign-up invitation link for Uber that allows any user to
We have been hearing a lot about Rule 41 after the US Department of Justice has pushed an update to the rule.
The change to the Rule 41 of the Federal Rules of Criminal Procedure grants the FBI much greater powers to hack legally into any computer across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any US judge.
When it comes to data breaches of major online services like LinkedIn, MySpace, Twitter and VK.com, it’s two-factor authentication that could save you from being hacked.
Two-factor authentication or 2-step verification is an effective way to secure online accounts, but many users avoid enabling the feature just to save themselves from irritation of receiving and typing a six-digit code that
What do you do to protect your ‘Privacy’ and keep yourself safe from potential hackers?
Well, Facebook CEO Mark Zuckerberg just need a bit of tape to cover his laptop webcam and mic jack in order to protect his privacy.
Yes, Zuck also does the same as the FBI Director James Comey.
<!– adsense –>
Zuckerberg posted a photo on Tuesday to celebrate Instagram’s 500 Million monthly user