News, Tips, Security Lab

Atomic Energy Organization of Iran

Hacktivists Stole 100,000 Emails from Atomic Energy Organization of Iran

The Atomic Energy Organization of Iran (AEOI) reported that the mail servers of one of its subsidiaries were hacked. Previously,…

Thousands of GitHub Repositories Spread Malware That Is Disguised as Exploits

Experts from the Leiden Institute for Advanced Computer Science have discovered thousands of GitHub repositories with fake PoC exploits for…

What is Norton Scam Email? Tips to Protect Yourself

Norton scam email is a tricky phishing campaign that pretends to be an official mailing from Norton. It generally aims…

Amazon Email Phishing: How to Protect Yourself?

Amazon email phishing is yet another form of email fraud that parasites on the name of a legit company. As…

New Vulnerability in Apache Commons Text Is Already Being Attacked by Hackers

According to WordPress security firm Defiant, attempts have already been made to exploit a new vulnerability in Apache Commons Text…

TYPES OF MALWARE ON YOUR ANDROID [PART 2]

TYPES OF MALWARE ON YOUR ANDROID [PART 2]

Forewarned is forearmed, this is the second part of our…

TYPES OF MALWARE ON YOUR ANDROID

TYPES OF MALWARE ON YOUR ANDROID

We all used to the fact that malware only affects…

10 tips to secure a laptop on vacation

10 Tips to Secure a Laptop on Vacation 🏝️

If you plan to bring your laptop on vacation, it’s…

Top 10 the most dangerous viruses of all time

Top 10 Deadliest Virus in

Computer viruses are really similar to real-life ones. They can…

How to become an expert in application security (Security tips)

How to become an expert in application security (Security tips)

Every day hundreds of new mobile applications appear in the…

Microsoft Tech Support scam affiliate program

Microsoft Tech Support Scam Affiliate Program

The new sector of cyber attacks has become popular nowadays.…

prevent data breaches

MongoDB Data Breaches

One of the biggest breaches of databases happened recently –…

How can hackers crack your router?

How can hackers crack your router?

Do you think that you are protected from hackers? Of…

Top-6 biggest tech failures of 2016

Top-6 biggest tech failures of 2016

Samsung Galaxy Note 7 The biggest failure of Samsung for…

The danger of botnet network

The Danger of Botnet Network: How to Detect Botnet on You PC

The word “botnet” is now ubiquitous, and almost all users…