Wednesday , May 20 2020

New Group of Iranian Hackers Linked to Destructive Malware

Iranian hackers

For more than five years, Iran has maintained a reputation as one of the most aggressive nations in the global arena of state-sponsored hacking, stealing data from corporate and government networks around the world, bombarding US banks with cyberattacks, and most brazen of all, unleashing multiple waves of computer-crippling malware …

Read More »

Facebook expert warns users of hacking risk

hacking

South African social media users are particularly at risk of being hacked as a result of poor digital literacy – hacking Facebook safety policy manager for Africa‚ Julie de Bailliencourt‚ said raising awareness on how to protect user accounts was a particular concern for the company in South Africa. De …

Read More »

Pakistan First OSCE Certified

Pakistan First OSCE Certified

Etizaz Mohsin is Pakistan first OSCE Certified who successfully achieved Offensive Security Certified Expert Certification (OSCE) along with Offensive Security Certified Professional Certification (OSCE). Read more about him. OSCE Pakistan – OSCE in Pakistan – Pakistan first OSCE – First OSCE in Pakistan – Pakistan OSCE Overview Offensive Security Certified …

Read More »

Reality Behind The “Blue Whale”, The Suicide Game

Blue Whale

Reality Behind The “Blue Whale”, The Suicide Game. For the past few days there has been a hype created all around the globe regarding the “Blue Whale Game”. Let’s take a look at the history of this deadly game. The Blue Whale Game is also known as “Blue Whale Challenge” …

Read More »

How To Configure SSH Key-Based Authentication on a Linux Server

SSH Key-Based Authentication

Introduction to SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users. (wikipedia) SSH known as secure shell is an encrypted protocol that is used to administer and …

Read More »

Sarahah secretly steals your contact list and personal details

Sarahah secretly steals contact list personal details

Sarahah application hits Google and Apple online stores, sources discovered that 18 million people are estimated to have downloaded the application. Since the viral application ranks 3rd most free downloaded app title on iphone and ipad. Sarahah motivates its users to “get honest feedback from your coworkers and friends”. Since …

Read More »

Security Researcher Who Stopped WannaCry arrested in U.S.

Security Researcher Stopped WannaCry arrested

SAN FRANCISCO/LAS VEGAS (Reuters) – A cyber security researcher widely credited with helping to neutralize the global “WannaCry” ransomware attack earlier this year has been arrested on unrelated hacking charges, according to court documents unsealed on Thursday – Security Researcher Stopped WannaCry arrested. The ransomware impacted computers in more than …

Read More »

Responsive WordPress Theme Freetheme wordpress magazine responsive freetheme wordpress news responsive freeWORDPRESS PLUGIN PREMIUM FREEDownload theme free