Cybersecurity news headlines (September 15-30)

In order to help you keep up with what’s going on in the world of cybersecurity, twice a month we publish articles detailing the biggest cybersecurity news stories from the previous two weeks. We provide information about data breaches, malware attacks and other major incidents related to cybersecurity.…

Cybersecurity news headlines (September 1-15)

Keeping up with cybersecurity news can be a challenge. To help you stay informed about what’s going on, twice a month, we will compile the biggest cybersecurity news stories into one report. Here you will find information about data breaches, widespread attacks, malware, and everything else related to cybersecurity.The first two weeks of September have been pretty calm, and we…

Most annoying scams of 2018

We all hope for a time when we do not have to navigate the Internet like a minefield, constantly having to avoid various threats trying to harm us. However, until such a time comes, we have to prepare ourselves. And one of the best ways to go about it is to inform yourself about what kinds of threat you could…

Cybersecurity news headlines (August 15 – August 31)

The second half of August has been quite unfortunate for certain companies due to serious data breaches that possibly exposed sensitive information of customers. Tech giant Apple, airline Air Canada and telecommunication company T-mobile were among them. There was also a rather bizarre hack that locked Instagram users out of their accounts, and Google was revealed to store people’s locations…

Remove Facebook scams (August , 2018)

Facebook creates the perfect environment for scams to flourish
With around 2.2 billion monthly active users, Facebook is the perfect place for scammers to do their thing. There are thousands or even millions of vulnerable users, and what better place is there for people looking to take advantage of others. You could encounter all kinds of different scams, from the silly…

9 Ways to Hack Your Bitcoin Wallet

1. Email Phishing
An email arrives in your inbox, seemingly from a service you are familiar with or have used before. The email looks completely legitimate, but it is not. Hackers make their phishing emails look identical to legitimate service emails, with the same formats and design used, thus it can be difficult to differentiate them. In some cases, the company…

ICO Hacking 2018

Hacking Bitcoin Mining Pools and Exchanges
Hacking a Bitcoin mining pool can be useful to crooks as the process involves using the processing power of a group of Bitcoin miners for one’s own benefit. However, doing so is a complicated process. The hackers need to target ISPs and compromise the Border Gateway Protocol (BGP) service, which connects different networks. By compromising…

Cybersecurity news headlines (July 1 – July 15)

July has been a pretty quiet month so far but we do have a couple of headlines to report. There were a couple of data breaches, military information stolen, users threatened with their porn viewing habits and the never ending Facebook controversy. But we did not witness any major incidents so it’s been relatively peaceful.…