Category: Security
Browser hijackers occupy the present-day cyberspace
The consequences of such unauthorized activity depend on how long the virus stays on the system. The longer hijacker displays the annoying ads... [...]
Another Facebook Scam is on the Loose
“i have a friend request from some stranger on facebook and i delete it without looking at the profile because that doesnt seem natural. cause friends [...]
Vodafone UK hackers managed to steal account data of nearly 2,000 customers
Early Saturday, Vodafone UK said that hackers successfully accessed customer accounts. It was the second such attack against a British telecom provide [...]
US ‘Dropping Cyberbombs’ on ISIS in New-Age Battle
As the terrorism war takes on to the digital sphere, Pentagon has declared that it is going to start ‘dropping cyberbombs’ on the jihadist militant gr [...]
Popular Google Play apps talk to malicious websites; put your personal info at risk: Study
Almost nine per cent of popular apps downloaded from Google Play interact with websites that could compromise users’ security and privacy, accor [...]
New Linux botnet targets servers with 150Gbps DDos attacks
Security researchers have discovered a new botnet that uses 150 Gbps DDos attacks to bring down servers and websites.
The Linux-based botnet has been [...]
More Apple devices will be attacked in 2016: Symantec
Cybercriminals are increasingly targeting Apple devices like iPhone and iPad as these products gain popularity among consumers across the globe, inclu [...]
Microsoft Silently Downloading Windows 10 on Windows 7, 8.1 Computers
the company has been downloading mammoth Windows 10 installation files even for those who never signed up for the company's program. [...]
Lenovo installing adware on laptops, exposing users to data theft
Lenovo's consumers laptops, which means the laptops that people buy in retail shops, come with a program called Superfish installed on them. [...]
Hackers using Twitter to steal data from US computer networks
Russian-based hijackers are using malicious software hidden in Twitter images to pass on commands and steal information from US computer networks, sec [...]