Home Search

phishing - search results

If you're not happy with the results, please do another search
AI attack

How not to get hacked by state-sponsored actors

0
News about Russian hackers creating chaos in the European Union or Chinese infiltration of a US company has almost become routine. In March 2019,...

Facebook fails to block ECJ data security case from proceeding

0
This July, the European Court of Justice (ECJ) in Luxembourg will now hear a case to answer questions on whether the American government's surveillance,...
ESA data leak security

Google to provide a free replacement key for its compromised Bluetooth Low Energy (BLE)...

0
Today, Google announced a security bug in its Bluetooth Low Energy (BLE) Titan Security Keys. This issue is due to a misconfiguration in the...
Crypto-cash is missing from Gerald Cotten's wallets

Hackers steal bitcoins worth $41M from Binance exchange in a single go!

0
On Tuesday, Binance Exchange, one of the popular cryptocurrency exchanges, reported a huge security breach where hackers stole around 7,000 bitcoins worth $41 millions,...
world wide web

Can an Open Web Index break Google’s stranglehold over the search engine market?

0
Earlier this month, Dirk Lewandowski, Professor of Information Research & Information Retrieval  at Hamburg University of Applied Sciences, Germany, published a proposal for building...
cloud computing

Fastly, edge cloud platform, files for IPO

0
Last week, Fastly Inc., a provider of an edge cloud platform announced that it has filed its proposed initial public offering (ipo) with the...
Email service

Microsoft reveals certain Outlook.com user accounts were hacked for months

0
On Saturday, Microsoft confirmed to TechCrunch that their email services were hacked from January 1, 2019, till March 28, 2019. Microsoft told TechCrunch, “Certain...
Why should developers learn blockchain?

What can Blockchain developers learn from Eclipse Attacks in a Bitcoin network – Koshik...

0
Networking attacks in blockchain are mostly ignored due to the difficulty involved in defeating a decentralized network that works using the peer-to-peer protocol. This...
tools to stay anonymous online

Norsk Hydro shares a 4-minute video on how its employees stood up for the...

0
It was later last month on 19th March, when Norsk Hydro ASA, a Norwegian and one of the world’s largest aluminum producer firm, had...
hacker

Knowing the threat actors behind a cyber attack

0
This article is an excerpt taken from the book, Hands-On Cybersecurity for Finance written by Dr. Erdal Ozkaya and Milad Aslaner. In this book you will learn...