Priya James

The debate of Ethereum vs Bitcoin: Can the Ethereum Take the Throne?

Bitcoin has always been the leading cryptocurrency running the show for quite some time now until in the year 2014…

7 years ago

Telegram Zero day Flaw Abused by Attackers in Wild to Install Malware and Cryptominers

Security researchers from Kaspersky revealed a Zero-day vulnerability in Telegram Windows client that abused by attackers in wild for installing…

7 years ago

Black Hat Asia 2018 – A Biggest Hackers Conference to Meet World Class Hackers & Security Experts

Black Hat announced it's Briefings of it's upcoming Black Hat Asia 2018 program. The events covers the latest developements with…

7 years ago

New Version of Privacy and Anonymous Operating System Tails Released with fix for Security Issues

Tails is a live operating system aims at privacy and anonymity, you can use the live operating system on any…

7 years ago

Using Breach & Attack Simulation Technologies to test Organizations Security Posture on-demand

The best way for an organization to protect itself against cybercrooks is to think and act like one. There is…

7 years ago

Advantages of Bug Bounty Program Over Traditional Penetration Testing

Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web…

7 years ago

Hackers who created Dangerous Mirai IoT Botnet Plead Guilty

Hackers pleaded guilty in creating and Operating the most dangerous Mirai Botnet that immobilize some popular websites and colleges. Mirai…

7 years ago

A new Hacker Group ‘MoneyTaker’ uncovered by Group-IB Attacking Banks in the USA and Russia

A new Hacker Group 'MoneyTaker' uncovered by Group-IB targetting financial institutions and law firms in the USA, UK, and Russia.…

7 years ago

TheOneSpy – World’s Most Demanding Mobile Spy Software

TheOneSpy is among the trendiest and bestselling mobile spy software intended for parents, spouses, and employers to track the mobile…

7 years ago

Are Online Gamers and eSports Fanatics at Risk of Cyber Attacks?

It is said that online gaming is fast becoming the latest frontier for cyber-criminals to attack. It’s easy to see…

7 years ago