Security
Hackers attack Samco, stealing Indian account data
A hacker has just offered to sell user data allegedly stolen from Samco Securities, a famous Indian online securities company. Samco provides low-cost stock brokerage services for trading on the country’s stock exchanges. This anonymous hacker posted a list of data allegedly taken from Samco on a forum specializing in cybercrime. They are selling at […]
Threads officially launches an independent information checking program
Meta, the group that owns Facebook and Instagram, just launched an independent fact-checking program for its newest social media app, Threads. This program marks a new step in Meta’s efforts to combat misinformation on its platform. Previously, Threads used the information checking system of both Facebook and Instagram. However, with this new program, Meta will […]
Hackers claim to have collected 49 million Dell customer addresses before the company discovered the breach
A hacker calling himself Menelik claimed he stole the data of 49 million Dell customers. Menelik claims to have illegally accessed an online Dell portal and stolen customer data, including home addresses, directly from Dell’s servers. Techlade has verified that a portion of the stolen data matches Dell customer records. On Thursday, Dell sent an […]
Cracking passwords using Brute Force takes more time, but don’t rejoice!
Although it takes longer to crack passwords than before using Brute Force, cybersecurity experts warn that this is not necessarily good news. The security level of a password depends directly on its length and composition, including numbers, letters and special characters. The shorter and simpler the password, the easier it is to crack in a […]
‘White hat’ hackers actively attack to protect network security systems
Organizations are increasingly proactive in their defenses to stop threats before they become attacks, according to a report published Wednesday by an attack simulation and phishing company. In its 2024 Security Validation & Exposure Management report, Cymulate argues that security leaders are aware that the model of buying new technology and managing vulnerabilities in a […]
‘Two-sided’ investment: Anti-spying but supporting malware?
Although cybersecurity investors regularly affirm their commitment to combating spyware, there have been cases where a company in the sector has invested in a manufacturer of exploitative software. On Monday, the Biden administration announced six countries joining an international coalition aimed at curbing the rise of commercial spyware. This type of software is provided by […]
- 1
- 2