Security News
Facebook Launches Data Abuse Bounty Program With rewards Up to $40,000
Facebook launches data Abuse Bounty Program that rewards researchers who report the abuse of data by app developers. The reward's based on just like...
Security News
1.5 Billion Files Exposed on Internet from Misconfigured FTP, SMB & S3 Buckets:12 Petabytes Publicly Available Sensitive data
More than 1.5 billion sensitive files exposed online publicly that including Patent Application, Payroll, Tax Return, Patient List, Copyright Application and Source Code.The data...
Security News
Sodexo Filmology Under Cyber Attack – Customers Need to Cancel Their Credit Cards
Cinema voucher-pusher Sodexo Filmology hit by a cyber attack that affected the customer's Credit cards and many of the Sodexo customers being affected by...
Cryptocurrency hack
Cryptocurrency Web Miner Makes into MSN Portal Through Advertising Platform
Cryptocurrency web miner scripts make into MSN portal through Advertising Platform AOL and create a large number of web miners. Hackers Modified the scripts...
Security News
ATMJackpot – New ATM Malware Steal Your Money From ATM using ATM Jackpotting Technique
New ATM Malware called ATMJackpot that is capable of dispensing large amounts of cash from the ATM Machine using ATM Jackpotting method.Previously discovered ATM Jackptting Malware...
Data Breach
Largest data Breach – 130,000 Finnish Username and Password’s Stolen by Hackers
More than 130,000 user's Plain text password has been exposed with the Largest data breach that affected by the Helsinki New Business Center. The...
Security News
Microsoft Added Ransomware Protection, Recovery & Email Encryption For Office 365 Users
Now office 365 users get's built-in Ransomware Detection, Recovery & Email encryption. The new functions are coming to Office 365 Home and Office 365...
Hardware Hacking
Cisco Switches are Vulnerable to Remote Hack to Gain Full Control Over a Vulnerable Network – Open Port with 8.5 Million Devices
A Remote Code Execution flaw that affected the Cisco switches that allow an attacker to gain the full control of the Vulnerable Cisco switch...