Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

By ghostadmin
For the last couple of years, there has been a surge in phishing attacks against businesses and unsuspecting users. What’s worse is that phishing, which was previously merely a fraudulent attempt to obtain sensitive information, is … Continue reading Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

Inside job: Bithumb crypto exchange hacked again; loses $20 million

By ghostadmin
This is the third time that Bithumb has been hacked to steal millions in cryptocurrency. Crypto industry is being hammered by cybercriminals with full frequency lately. There are reports of a new attack against South Korean bitcoin exchan… Continue reading Inside job: Bithumb crypto exchange hacked again; loses $20 million

FEMA leaks sensitive details of 2.3 million disaster survivors

By ghostadmin
The Department of Homeland Security’s Office of the Inspector General has released a report revealing that FEMA (Federal Emergency Management Agency) couldn’t protect the private and confidential information of about 2.3 million hurricane… Continue reading FEMA leaks sensitive details of 2.3 million disaster survivors

Authorities shut down xDedic marketplace for selling hacked servers

By ghostadmin
The domain for xDedic has been seized as well. In a joint operation, the Federal Bureau of Investigation (FBI) and authorities from several European countries have successfully taken down xDedic, a notorious dark web marketplace known for… Continue reading Authorities shut down xDedic marketplace for selling hacked servers

Man arrested for stealing $1m from Silicon Valley Exec via SIM-swapping

By ghostadmin
A 21-year old Manhattan resident has been accused of SIM-swapping the mobile number of Robert Ross, a Silicon Valley executive, and managed to steal $1 million. The accused, Nicholas Truglia, not only targeted Ross’s phone number with SIM… Continue reading Man arrested for stealing $1m from Silicon Valley Exec via SIM-swapping

Spectre attack variant can be remotely mounted to extract sensitive data

By ghostadmin
What we know so far about Spectre attacks is that it relies upon execution of malicious code. The code is executed on computers having speculative-execution design flaws in processor chip; once a device is compromised, it becomes possible… Continue reading Spectre attack variant can be remotely mounted to extract sensitive data

Opera Mobile Browser for Android & iOS Blocks Cryptocurrency Mining

By ghostadmin
Last month Opera introduced its browser’s 50 beta version with
This is a post from HackRead.com Read the original post: Opera Mobile Browser for Android & iOS Blocks Cryptocurrency Mining
Continue reading Opera Mobile Browser for Android & iOS Blocks Cryptocurrency Mining