What are the 3 ways to avoid phishing? What is phishing and how it can be prevented? What are examples of phishing attacks?
Continue ReadingAttacks
IcedID Banking Trojan
IcedID is a banking trojan that first appeared in 2017. This malware attacks corporate victims, mainly banks and financial institutions.
Continue ReadingEvil Twin Attacks
Wi-Fi networks can be set up by smart IT people and used as evil twin attacks.
Continue ReadingAndroid Malware Chinese Espionage
A group of cybersecurity researchers found Chinese spyware malware targeting Uyghurs, masquerading as Android apps.
Continue ReadingThe World’s Worst Botnet
Emotet, one of the world’s worst Malware or Botnet has ramped up again and already has more than 130000 machines in 179 different countries compromised.
Continue ReadingTampa Teen Hacking of Twitter
Graham Clark is now serving a three-year prison sentence for hacking Twitter, dozens of celebrities and stealing tens of thousands of dollars in Bitcoin.
Continue ReadingToy Spied on 6.4 Million Children
He showed that this toy was illegally spying on 6.4 million children after he hacked into Vtech and compromised 6 million accounts.
Continue ReadingDevice Destroys Security Cameras
This device will destroy your WiFi! 😲 Its crazy how a device that is easily available online, can jam your WiFi and take your security cameras offline.
Continue Reading21st Century Hackers
White hat ethical hackers, the U.S. Secret Service’s cyber-crime division working to protect us from the risks associated with persistent connectivity.
Continue ReadingCybersecurity in Space
Cybersecurity expert and former CIO of NASA Renee Wynn believes that what’s going on above our heads should make us all sit up and take notice.
Continue ReadingDigital and Intelligence Service
Singapore first cyber defence exercise, conducted by the Singapore Armed Forces’ Digital and Intelligence Service.
Continue ReadingWhat is a Cyber War?
Russia has used fake news and sabotage in a cyber war against Western nations for years a term they call Active Measures, but it doesn’t stop there.
Continue ReadingBeginner to Advanced Bug Bounty
Ethical hacking web application hacking and bug bounty hunting course. Beginner to Advanced Bug Bounty Hunting Course.
Continue Reading





