Darknet

Darknet

Image provided by pixabay

Telegram has become the working ground for the creators of phishing bots and kits looking to market their products to a larger audience or...
cyber security. image provided by pixabay

Once digital property gains value in the virtual world, the risk of cyber-attacks, hacking, theft, ransomware and phishing will noticeably increase without proper cyber...
Deep web. image by pixabay

A recent report has shown that many social media databases are currently being sold on Breach Forums, a popular hacking forum on the Dark...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
bitcoin

The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...
Biometrics

Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
cyber security

As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
cyber

  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
cyber

IAI’s cyber activity continues to grow. The company’s 2016 contracts concluded in this field totalled more than $100 million, all of them in the...

Until not long ago China was reluctant to open to the developments in the Internet shpere. However, in recent years this country has been...

Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...

The privacy focused Tor network has been a regular feature of the news in recent years, most recently with the confirmation by a US...

Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...

Jared Cohen, director at Google Ideas and an advisor to the heads of parent company Alphabet Google, said ISIS should be kicked off the...
anonymousvideo

Following Anonymous’ declaration of “total war” on ISIS, the hacktivist collective reports taking down more than 5,500 Twitter accounts belonging to ISIS members. Details...

The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...

TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...

In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...

Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...

Latest