• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 21st, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Security
Southampton University Creates 5D Storage Disc That Can Store 360TB Data
Ali Raza
Security

Southampton University Creates 5D Storage Disc That Can Store 360TB Data

February 17th, 2016 0
The mindblowing invention will revolutionise the way we store data Last year the researchers came up with a processor capable of transmitting data using light. Now, United Kingdom’s Southampton University created an optical disc that is...
Cybercriminals Hack Hospital PCs Demand Whopping 9000 BTC Ransom
Uzair Amir
Security

Cybercriminals Hack Hospital PCs Demand Whopping 9000 BTC Ransom

February 17th, 2016 0
Ransomware Infects Hollywood HealthCare Facility Computers - Attackers Demand $3.6M Computers are an integral part of almost every field and industry nowadays and perhaps, no department can work well without them. Therefore, it is understandable...
Hackers To Demonstrate How To Hack An Offline Laptop
Pushpa Mishra
Security

Hackers To Demonstrate How To Hack An Offline Laptop

February 16th, 2016 0
White Hat Hackers show us how to Steal Crypto Keys from a Laptop in Another Room Sans Internet Connection (adsbygoogle = window.adsbygoogle || ).push({}); Last year, it was revealed that hackers can steal data from any computer via...
Turning back Time on your iPhone can “Brick” the Device- Don’t Fall for the 1970 Scam
Carolina
Security

Turning back Time on your iPhone can “Brick” the Device- Don’t Fall for the 1970 Scam

February 16th, 2016 0
Turning back Time on your iPhone can “Brick” the Device- Don’t Fall for the 1970 Trick Apple is just not “sure” why it's happening but it's a fact that if you follow the instructions of a deceptive hoax message your iPhone will be...
Password Security — Who's to Blame for Weak Passwords? Users, Really?
Ali Raza
Security

Password Security — Who's to Blame for Weak Passwords? Users, Really?

February 15th, 2016 0
Password Security — Who's to Blame for Weak Passwords? Users, Really? The vulnerability of people falling into the traps of online miscreants is huge. Owing to a large number of people coming online for the first time (mainly from the third...
Netflix Users Targeted with Phishing and Malware Scams Stealing Credit Card Data
Waqas
Security

Netflix Users Targeted with Phishing and Malware Scams Stealing Credit Card Data

February 15th, 2016 0
Malware in Netflix Apps Steals Credit Card details of Users--- Symantec Researchers Netflix Apps delivering more than movies: Netflix has become excessively popular among people all over the world as it offers free online entertainment. But,...
Latest Android Malware with Rooting Abilities Can Wipe Your Data
Waqas
Security

Latest Android Malware with Rooting Abilities Can Wipe Your Data

February 14th, 2016 0
If you think you have seen it all then you are wrong --- Here comes a malware that will make your phone into a crappy box. Mazar Bot boasts of so many hidden capabilities that security experts have dubbed it as such a strong malware that can...
A Hacker’s Paradise: Top 20 Cities with Most Malware Infections
Ali Raza
Security

A Hacker’s Paradise: Top 20 Cities with Most Malware Infections

February 11th, 2016 0
You read about Malware every day but do you know which cities in the US have most malware infections? If people could see the delight in a hacker’s eyes when they come across an easy target, they might mistake those hackers for an 8-year-old...
10 Famous Bug Bounty Hunters of All Time
Ali Raza
Security

10 Famous Bug Bounty Hunters of All Time

February 10th, 2016 0
(adsbygoogle = window.adsbygoogle || []).push({}); If you are following HackRead you must be aware of what is bug bounty and how it works but did you know who are the most famous Bug Bounty Hunters? Bug Bounty Programs are programs whereby...
Beware, Latest WhatsApp Scam Drops Malware on Your Device
Waqas
Security

Beware, Latest WhatsApp Scam Drops Malware on Your Device

February 9th, 2016 0
Watch out for latest WhatsApp scam tricking users into opening malware link sent by ''friends'' The favorite app of all youngsters and adults alike, WhatsApp, has come under the hammer of scammers yet again. Reportedly, WhatsApp users have become...
Page 217 of 274...214215216217218219220...

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us