Network Security passwords million zomato hacked

Related Stories:

Technology

Internet

Network Security

zomato hacked hacker puts million users emails passwords sale

wannacry ransomware decryption tool released unlock files without paying ransom

wikileaks reveals athena cia spying program targeting versions windows

more hacking groups found exploiting smb flaw weeks before wannacry

Network Security Thu May 18 2017 08:30:00 GMT+0000 (UTC)
WHERE THE PARTY'S AT -- If you ever ordered food from Zomato, You should be Worried! India's largest online restaurant guide Zomato confirmed today that the company has suffered a data breach and that accounts details of millions of its users have been stolen from its datab
Millions of Android smartphones are at serious risk of "screen hijack" vulnerability that allows hackers to steal your passwords, bank details, as well as helps ransomware apps extort money from victims. The worse thing is that Google says it won't b
A team of researchers from the University of Michigan discovered that hundreds of applications in Google Play Store have a security hole that could potentially allow hackers to steal data from and even implant malware on millions of Android smartphon
Last week, we reported about a so-called 'vigilante hacker' who hacked into at least 10,000 vulnerable 'Internet of Things' devices, such as home routers and Internet-connected cameras, using a botnet malware in order to supposedly secure them. Now,
By now I am sure you have already heard something about the WannaCry ransomware, and are wondering what's going on, who is doing this, and whether your computer is secure from this insanely fast-spreading threat that has already hacked nearly 200,000
Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools allegedly belonged to the NSA's elite hacking team Equation Group several hacking groups and individual hackers have started using them in their own way. The Ap
WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework which "provides remote beacon and loader capabilities on target computers" allegedly being used by the CIA that works against every version of Microsoft's
If your PC has been infected by WannaCry the ransomware that wreaked havoc across the world last Friday you might be lucky to get your locked files back without paying the ransom of $300 to the cyber criminals. Adrien Guinet, a French security resear
After the shutdown of Kickass Torrents and Torrentz.eu, it's time for the torrent community to say goodbye to the second most popular torrent site in the world, ExtraTorrent. Yes, the popular torrent site ExtraTorrent has permanently shut down. So, s
If your website is based on the popular Joomla content management system, make sure you have updated your platform to the latest version released today. Joomla, the world's second popular open source Content Management System, has reportedly patched
While we all were busy in the WannaCry ransomware menace, two separate data breaches have been reported, one in DocuSign, a major provider of electronic signature technology, and another in BELL, Canadas largest telecommunications company. In a notic
A security researcher has discovered a serious vulnerability in the default configuration of the latest version of Google's Chrome running on any version of Microsoft's Windows operating system, including Windows 10, that could allow remote hackers t
A security researcher has just discovered a stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks. According to Kafeine, a security researcher at Pro
The infamous hacking collective Shadow Brokers the one who leaked the Windows SMB exploit in public that led to last weekend's WannaCrypt menace are back, this time, to cause more damage. In typically broken English, the Shadow Brokers published a fr
While Windows users are currently in fear of getting their systems hijacked by the WannaCry ransomware outbreak, Apple users are sitting relaxed, thinking that malware attacks are something that happens to Windows users, and not Apple. But you are mi
So far, nobody had an idea that who was behind WannaCry ransomware attacks? But now there is a clue that lies in the code. Neel Mehta, a security researcher at Google, found evidence that suggests the WannaCry ransomware, that infected 300,000 machin
When the world was dealing with the threat of the self-spreading WannaCry ransomware, WikiLeaks released a new batch of CIA Vault 7 leaks, detailing two apparent CIA malware frameworks for the Microsoft Windows platform. Dubbed "AfterMidnight" and "A
If you are following the news, by now you might be aware that a security researcher has activated a "Kill Switch" to stop WannaCry ransomware from spreading further, which has already infected over 170,000 computers across 99 countries worldwide only
In the wake of the largest ransomware attack in the history that had already infected over 114,000 Windows systems worldwide since last 24 hours, Microsoft just took an unusual step to protect its customers with out-of-date computers. Microsoft has j
Update We have published another articlewith more detailed information on the WannaCry ransomware attack that has become the largest ransomware attack in the history within just a few hours. Moreover, If you are using an unsupported version of Window
Struggling to learn how to code? If youre looking to 'learn how to code' and seeking a career as an expert-level programmer, you should know how to play with codes and make your own. It's no secret that mastering a coding language or two can put you
Microsoft has been expressing its love for Linux and Open Source for almost three years now, and this love is embracing as time passes. Just last year, Microsoft made headlines by building support for the Bash shell and Ubuntu Linux binaries into Win