Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Wireshark 3.0.5 Released with the fix for Several Vulnerabilities

Wireshark 3.0.5 has been released with the new Qt version and fix for other vulnerabilities. The Qt is the library used in Wireshark to build the UI. The Wireshark is the...

Android Q is 10 – What to Expect

Android 10 formerly known as Android Q is officially available for use. More than a year of development and testing Android 10 has been released with promising features nobody wants...

CryptoCurrency Breaches and Hacking Scandals: How to Address them?

The proponents of cryptocurrency always harp on the point that it is very safe and secure and the blockchain technology that is used is virtually hacking proof. Let’s face it,...

How to better protect yourself from data hacking

I’m Terry Cutler, the creator of Internet Safety University …That’s a system that’s been used to help defend corporations and individuals from cyber threats.   I’m a government cleared cybersecurity expert...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of their studies. The traditional method of learning, which has been used for many years, is fast going out...

Threat landscape for smart buildings

The Kaspersky Industrial Cybersecurity Conference 2019 takes place this week in Sochi, the seventh such conference dedicated to the problems of industrial cybersecurity. Among other things, the conference will address...

PDF Phishing Attacks Using Microsoft OneDrive Surge Nearly 200%

Scammers use a mixture of familiar brand, unsuspecting users, legitimate document types and locations, and credential harvesting in this attack aimed at getting into your Office 365. If a cybercriminal can...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

Open Source Security Tool to Find Vulnerabilities in Modern Cars

Cisco released an open-source hardware tool called “4CAN” for automobile security researchers and car manufacturers to find the potential security vulnerabilities in connected cars to ensure vehicle security. Automobile systems such...

APLICATIONS

LG G8 Can Unlock By Scanning the Veins In Your Hand...

LG has commenced Mobile World Congress with a cluster of extravagant telephones. Notwithstanding its first...

HOT NEWS