You Searched For "security hacks" and got 19 results
Sort By:
Election Commission of India refutes claims made by a 'cyber expert' that the 2014 elections were rigged
"It needs to be reiterated that these EVMs are manufactured in Bharat Electronics Limited (BEL) …
WhatsApp and Telegram may not be as secure you think hints new study
Popular mobile messengers like WhatsApp expose personal data via discovery services that allow user…
Apple Fixed The Security Hole That Let Anyone Change Your Password With Just Your Email And Birthday
The flaw came to light a day after Apple enabled two-step verification for Apple ID logins. That me…
A Security Consultant Who Used To Rob Banks For A Living Is Giving Away His Secrets For Free
But his skills in security probing don't stop with banks. He's knowledgeable in a wide berth of fie…
Dylan Love
Zomato hacked! 17 million user records stolen; hackers ask for payment in bitcoins
The stolen information has email addresses and hashed passwords of customers. Hashing tur…
5 pre-requisites for banks while building cyber security infrastructure
Here are five prerequisites for banks to consider while strengthening their cyber security infrastr…
Sorry, But That 'Chinese' Hacking Report Proves Nothing
It's become a self-fulfilling prophecy over the years. We look for China to be the villan through g…
Adam Taylor
The NSA Published An Instruction Manual On How To Obtain Secret Documents Using Google
Before you run off and start trying to become an amateur hacker, the author warns that users must b…
Kevin Smith
Security Researchers Gave Snapchat A Nasty Christmas Present By Telling The World How To Hack Snapchat
The researchers, who call their company Gibson Security, were frustrated that Snapchat had ignored …
This Diagram Shows How A Recent String Of Hacking Attacks Came From One Cyber Arms Dealer
It seems a minor discovery-after all, somebody has to build the tools with which to compromise netw…
Harrison Jacobs
Google finds 'iOS exploit chains' that have been hacking iPhones for years
These 'exploit chains' allowed the hackers to gain root access, which is basically the highe…
Security Researchers Prove That Dropbox Can Be Hacked
“We appreciate the contributions of these researchers and everyone who helps keep Dropbox safe. How…
Julie Bort
Security Researchers Prove That Dropbox Can Be Hacked
"We appreciate the contributions of these researchers and everyone who helps keep Dropbox safe. How…
HACKED: Sylvester Stallone's Social Security Number
The hack is being widely blamed on North Korean operatives because it used similar methods as past …
Matt Rosoff
Here are the most controversial data breaches of 2018 that affected Indian users
Amid concerns of rising security threats globally, India has had its fair share of hacking-related…
Your IT Department May Be Trying To Trick You With Cute Cat Emails
It may seem like something of a sideshow compared to mandating good passwords or encrypting data, b…
Max Nisen
This Could Be The Most Accurate Video Game About Hacking Ever Made
There are a couple ways of looking at this. Criminal hacking is serious business, and it's importan…
Kevin McLaughlin
Members of Congress 'left with more questions than answers' after classified briefing about SolarWinds, saying administration 'unwilling to share the full scope of the breach'
House Oversight National Security Chairman Stephen Lynch said, "It's like pulling teeth to get any …
Azmi Haroun
Inviting the hacker in
Every company has sensitive data needing pro¬tection. Employing a team to focus on how to protect t…