Home Search
whatsapp - search results
If you're not happy with the results, please do another search
WhatsApp video call can make you easy prey to cybercriminals: Research
A recent survey has discovered that answering a WhatsApp video call can compromise your smartphone. According to Natalie Silvanovich, a digital forensics expert at...
Chinese hackers targeting WhatsApp, Indian Army warns users
The Indian Army has issued a warning to users of social messenger application, WhatsApp, alleging that Chinese hackers are targeting them to extract personal...
Organizations Suffer 270 Attempts of Cyberattacks in 2021
Cyberattacks and data breaches can be devastating to an organization's growth. Fuelled by the COVID-19 pandemic, enterprises worldwide sustained significant losses due to cyberattacks,...
Facebook Issues Cease and Desist Warnings; Bans Seven Surveillance-for-Hire Groups
Facebook, based on months of investigation, has banned seven cyber entities from their platform for manipulating and engaging in surveillance activity.
Facebook revealed that the...
Apple Files Lawsuit Against NSO Group for State-sponsored Surveillance
Israel’s cyber intelligence and surveillance company NSO Group is once again in a legal row.
On November 23, 2021, Apple stated that the company has...
Australia Proposes Bill on Parental Consent for Minors on Social Media
The Australian government has proposed the Privacy Legislation Amendment (Enhancing Online Privacy and Other Measures) Bill 2021 to safeguard Australians against various data threats...
Microsoft is Attackers’ Favorite for Brand Phishing Attacks
Technology giant Microsoft continues to be the favorite brand of cybercriminals for phishing attacks. According to Check Point’s Brand Phishing Report for Q3 2021,...
Facebook Outage – Was it a BGP hijack?
Social media platforms are ingrained into the lives of billions of people across the globe and the unavailability of any one of them brings...
A Day in the Life of a Modern CISO
Over the last two decades, the role of a CISO has gained significant importance for businesses. The life of a CISO can vary quite...
Attackers Found Leveraging Telegram App to Share Stolen Data
In addition to attacking techniques, cybercriminals often rely on various mediums to deploy/spread their malware or Trojans across targeted networks. Several threat actor groups...