Home Security Hacking News

Hacking News

Joker Malware

Google booted 24 apps from the Play store infected with Joker malware

A group of security researchers discovered 24 apps on Google play store were infected by the notorious Joker Malware that sucked money from users by subscribing to paid subscriptions without their concern. The CSIS Security...

Malicious Websites were used to Hack into iPhones for Years, says Google

When it comes to security, Apple always makes enormous claims about privacy and user security. Apple shows a deep interest in protecting its users from data breaching and viruses, but over a past few...
Jack Dorsey Twitter

Twitter CEO Jack Dorsey’s Twitter Account Hacked!

Twitter account of Jack Dorsey, CEO, and founder of twitter got hacked and used as a medium to spread offensive, racial slur, bomb threats, and posts that go against the community guidelines. Twitter CEO Jack...
Hackers Can Decode Your Passwords Just From The Sound Of Typing

Hackers Can Decode Your Passwords Just From The Sound Of Typing

Recently, researchers at Southern Methodist University in Texas have found that hackers can crack your passwords just by listening to the sounds of your keystrokes. The microphone of smartphones could allow hackers to figure...

NASA Hacked!! Hackers Stole 500 MB Of Secret Data

Recently, the U.S. Office of Inspector General published a report in which they mentioned that NASA's Jet Propulsion Laboratory (JPL) had been hacked. The hack went unnoticed for approximately ten months. This was because...
BEWARE! This PNG Image Can Hack Your Android Smartphone

BEWARE! This PNG Image Can Hack Your Android Smartphone

We all know very well that for some time now, the Mountain View company, of course, the tech giant Google releases a monthly security update for its popular and most used mobile operating system,...
What Is The Difference Between Phishing And Spam?

What Is The Difference Between Phishing And Spam?

We all know very well that there are various types of attacks that we are exposed to at the moment, among which we can highlight the well-known and most used attacks and means, of...
You Can Now Get $2 Million For Hacking iPhone

You Can Now Get $2 Million For Hacking iPhone

We all know very well that the search for security holes in devices and bugs in applications has furnished high values for hackers and those who study this area, of course, security researchers. Hence,...

PewDiePie vs T-Series: Hackers Take Over Google’s Chromecast

We all know very well that PewDiePie has more than 79 million subscribers on YouTube and not only that even, for now, it has the channel with the most subscribers in the world. But,...
Here Are The Top 100 Worst, But Most Used Passwords (2018)

Here Are The Top 100 Worst, But Most Used Passwords (2018)

Every year, the most frequently leaked passwords are released, and 123456 has long been at the top. Hence, today in this article we will show you the most common and worst passwords of the...

STAY CONNECTED

1,481,013FansLike
21,748FollowersFollow
532FollowersFollow
95,065FollowersFollow
2,546FollowersFollow
1,564SubscribersSubscribe

LATEST