Victims of ransomware attacks generally end up paying the ransom the hacker demands so they can retrieve their encrypted files and data. This trend is…
Category: Cybersecurity
Apple Officially Bans Crypto Mining on iOS Devices
Apple has already been battling issues related to battery usage on its iPhones, as reported by the phone users on various counts, and has been…
Bug Bounty Programs in 2019
Bug bounty programs have become a solid staple to help turn hackers and computer security researchers away from any black hat activity while still providing…
InvisiMole: A New Malware Strain Discovered
ESET security researchers have found a new and sophisticated malware dubbed “InvisiMole” which they say has been used since 2013 to perform targeted attacks both…
VPNFilter Router Malware Targets More Devices
A few weeks ago, news broke that sophisticated malware known as VPNFilter had compromised over 500,000 routers and other devices across the globe. The VPNFilter…
92 Million User Accounts Compromised in MyHeritage Security Breach
Israel-based DNA testing and genealogy firm MyHeritage has suffered a major data breach which has compromised the hashed passwords and email addresses of 92 million…
