Browsing category

Uncategorized

Data Breach, Microsoft, microsoft hacked, Outlook, Password Attacks, Uncategorized,

Microsoft Hacked – Hackers Compromised The Microsoft Employee’s Account to Gain Access the Customers Email

Microsoft Announced a data breach by unknown hackers who have compromised the Microsoft technical support agent’s credentials and gain access the some of the Microsoft customer’s Email. Cybercriminals breached the Microsoft network between January 1 and March 28 and compromise the Microsoft support agent’s credentials. Microsoft notified to the customer via Email on Friday said, […]

The post Microsoft Hacked – Hackers Compromised The Microsoft Employee’s Account to Gain Access the Customers Email appeared first on GBHackers On Security.

Computer Security, Digital Signature, email, email attachment, Encryption, Malware, Password Attacks, Phishing, secure email, Social Engineering, Spam, spoofing, two-factor authentication, Uncategorized,

Top 10 Best Preventive Methods to Secure Email Accounts from Email Hackers

Secure Email

Secure Email Accounts is one of the most important concerns in the digital world since the email account is one of the most targetted sources for cyber attacks . The Email accounts are the tempting targets for hackers, they find every possible way to infiltrate your email accounts as they are the unique identifiers for […]

The post Top 10 Best Preventive Methods to Secure Email Accounts from Email Hackers appeared first on GBHackers On Security.

Cyber Crime, Cyber Security News, Julian Assange, Julian Assange Arrested, news, Uncategorized, Wikileaks,

WikiLeaks Founder Julian Assange Arrested at Ecuadorian Embassy in London

Julian Assange arrested

The Wikileaks founder Julian Assange arrested at the Ecuadorean Embassy in London after Ecuador withdrew asylum provided to him. Julian Paul Assange is an Australian computer Hacker and the Founder & editor-in-chief of WikiLeaks. He also faces US federal conspiracy charges related to one of the largest ever leaks of most sensitive government secrets. Assange […]

The post WikiLeaks Founder Julian Assange Arrested at Ecuadorian Embassy in London appeared first on GBHackers On Security.

Android, Android as a security key, chrome, Computer Security, Google, two-factor authentication, Uncategorized,

Now Use Your Android Phone as a Physical Security Key – Google’s New Advanced Two-factor Authentication

Android Phone as a Security Key

Google announced a new Two-factor authentication method let Android Phone to be used as a physical security key when users log into a Google account with the Chrome browser. This is a new era for 2-factor authentication which is one of the very effective and the most secure ways to log in your Google accounts. […]

The post Now Use Your Android Phone as a Physical Security Key – Google’s New Advanced Two-factor Authentication appeared first on GBHackers On Security.

3-year-old, Apple, iPad, lock out, TECH NEWS, Uncategorized,

3-year-old boy Locked his Dad’s iPad until 2067 by Entering the wrong Password

3-year-old

A 3-year-old boy locked out his dad’s iPad for more than 48 years by entering the wrong password repeatedly. iPad lockout feature is a security feature with Apple devices, the kicks out whenever someone entering the wrong password. If you enter wrong password for six times it get you 1 minute lockout, 7 gives you […]

The post 3-year-old boy Locked his Dad’s iPad until 2067 by Entering the wrong Password appeared first on GBHackers On Security.

Computer Security, Microsoft, Microsoft security updates, security updates, Uncategorized, Vulnerabilities, Windows, ZERO day,

Microsoft Released Security updates & Fixed 74 Vulnerabilities Including 2 Latest Zero-day

Microsoft security updates for April 2019 released under patch tuesday with the fixes of 74 vulnerabilities including 2 Zero-day vulnerabilities that are actively being exploited in Wide. Microsoft marked 15 vulnerabilities as “Critical” that affected different Microsoft products and the users are urged to apply the patch immediately to protect your Windows system. Microsoft April […]

The post Microsoft Released Security updates & Fixed 74 Vulnerabilities Including 2 Latest Zero-day appeared first on GBHackers On Security.

adobe, Adobe Security updates, Computer Security, Flash Player, security updates, Uncategorized,

Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More

Adobe security updates

Adobe security updates released for April with the fixes of 43 vulnerabilities that affected different Adobe products. There are 8 different Adobe products are affected including Adobe Flash Player, Shockwave Player, Dreamweaver, Adobe XD CC, Adobe Experience Manager Forms, and Adobe Bridge CC. In this case, Overall 21 adobe family vulnerabilities are fixed and 11 […]

The post Adobe Released Security Updates & Fixed 43 Vulnerabilities in Acrobat Reader, Adobe Flash & More appeared first on GBHackers On Security.

Computer, Computer Security, hacked, School Computer, Security Hacker, Security News, Uncategorized,

Two 14-year-old Boys Hacked School WiFi Network to Avoid Exam

Two School students at a New Jersey high school Jamming their School WiFi Network on multiple times to avoid exams. Both students were charged with the to commit computer criminal activity after school, both of the student’s name was not released. In this case, they used an app or a computer program to take down […]

The post Two 14-year-old Boys Hacked School WiFi Network to Avoid Exam appeared first on GBHackers On Security.

Computer Security, Cyber Security News, Malware, Malware analysis, Uncategorized,

Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents

Malware Families

Hackers used hosting infrastructure in the United States to host 10 malware families and distributed them through mass phishing campaigns. The hosted malware families include five banking Trojans, two ransomware and three information stealer malware families. The malware includes familiar ones such as Dridex, GandCrab, Neutrino, IcedID, and others. Bromium has tracked the operations so […]

The post Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents appeared first on GBHackers On Security.