Despite the presence and implementation of robust security protocols, various persistent and ever-evolving hacking strategies continue to exist. This clearly depicts how innovative criminal hackers are to execute their malicious activities. Once again, re

Posted on 22-10-2019
https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/

NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been bre...

Hackers Now Employ Steganography To WAV Audio Files For Hiding Malware

Posted on 22-10-2019
https://latesthackingnews.com/2019/10/20/hackers-now-employ-steganography-to-wav-audio-files-for-hiding-malware/

Despite the presence and implementation of robust security protocols, various persistent and ever-evolving hacking strategies continue to exist. This clearly depicts how innovative criminal hackers ar...

Hackers target UM e-pay link with protest message

Posted on 18-10-2019
https://www.malaysiakini.com/news/496350

The latest development in the ongoing Universiti Malaya saga has seen the university's online e-pay link being targeted by hackers. The link, which is at the bottom right of the university&rsquo...

Facebook Sweetens Deal for Hackers to Catch Security Bugs

Posted on 18-10-2019
https://www.wired.com/story/facebook-bug-bounty-third-parties-double-dip/

In the wake of extensivemishandling of user dataand a series ofsecuritymissteps, Facebook has deployed a number of security and privacy initiatives. A key focus:expandingits long-standingbug bounty pr...

Secure all your passwords -Titan Security Key

Posted on 16-10-2019
https://cloud.google.com/titan-security-key/

Titan Security Keys are phishing-resistant two-factor authentication (2FA) devices that help protect high-value users such as IT admins and executives. Titan Security Keys work with popular devices, b...