Israeli cyber security experts stop North Korean attack. It uses cyber-crime to rob cryptocurrency around the globe in order to fund its nuclear program.
Continue ReadingThreat Research
How Does North Korea Pay for Nukes
The North Korea record-breaking missile tests in 2022 have unnerved global powers. But how does the impoverished nation finance its missile tests?
Continue ReadingTackling the Hackers
Ending the hackers ransomware attacks are a top priority as the European Parliament signed off on tough new cybersecurity rules.
Continue ReadingJeff Bezos Phone Was Hacked
Joe Rogan and Gavin de Becker discuss how MBS hacked into Jeff Bezos phone and exposed some of his pictures.
Continue ReadingIcedID Banking Trojan
IcedID is a banking trojan that first appeared in 2017. This malware attacks corporate victims, mainly banks and financial institutions.
Continue ReadingAndroid Malware Chinese Espionage
A group of cybersecurity researchers found Chinese spyware malware targeting Uyghurs, masquerading as Android apps.
Continue ReadingThe World’s Worst Botnet
Emotet, one of the world’s worst Malware or Botnet has ramped up again and already has more than 130000 machines in 179 different countries compromised.
Continue ReadingTampa Teen Hacking of Twitter
Graham Clark is now serving a three-year prison sentence for hacking Twitter, dozens of celebrities and stealing tens of thousands of dollars in Bitcoin.
Continue ReadingToy Spied on 6.4 Million Children
He showed that this toy was illegally spying on 6.4 million children after he hacked into Vtech and compromised 6 million accounts.
Continue ReadingHow to Track Anyone’s Location
How to track anyone’s location without their knowledge. It is possible to track phones in real-time without them knowing and it’s 100% free.
Continue ReadingDevice Destroys Security Cameras
This device will destroy your WiFi! 😲 Its crazy how a device that is easily available online, can jam your WiFi and take your security cameras offline.
Continue ReadingIs my phone listening to me?
Is my phone listening to me everyone who uses popular social media apps like Facebook and Instagram can talk about advertisements popping into their feeds.
Continue Reading21st Century Hackers
White hat ethical hackers, the U.S. Secret Service’s cyber-crime division working to protect us from the risks associated with persistent connectivity.
Continue Reading






