EHA
Home Search

Spyware - search results

If you're not happy with the results, please do another search
Hundreds of Malicious Chrome Browser Extensions With Used for Stealing User Sensitive Data – 32 Million Users Affected

Hundreds of Malicious Chrome Browser Extensions With Used for Stealing User Sensitive Data –...

Recently, the security researchers of Awake Security have discovered 111 malicious browser extensions, that are used for stealing users' sensitive information. These malicious extensions...
Cognizant Confirms Data Breach Following Ransomware Attack

Cognizant Confirms Data Breach Following Ransomware Attack

Recently, Cognizant, an American IT service giant, has confirmed a data breach and said that the unencrypted data was accessed and stolen during a...
Facebook Messenger App for Windows Vulnerability Let Hackers Hijack a Call & Install Malware

Facebook Messenger App for Windows Vulnerability Let Hackers Hijack a Call & Install Malware

Researchers has disclosed a severe vulnerability in the Facebook messenger for Windows that lets hackers to hijack calls easily and then install malware and...
Google Faces with $5 billion Lawsuit in the U.S. for Tracking When Users Browsing via “Incognito” Mode

Google Faces with $5 billion Lawsuit in the U.S. for Tracking When Users Browsing...

Tech giant Google was sued on Tuesday and it faces $5 billion in lawsuits in the U.S. For tracking Millions of users' private internet surfing...
267 million Facebook profiles

Hackers selling 267 Million Facebook Identities in Dark Web for 500 Euros

The cybersecurity intelligence firm Cyble which is specialized in finding data breaches found that 267 million Facebook profiles data are being sold on the...
What is Malware

What is Malware? Removal and Prevention

Malware is a software or malicious code that is specifically designed for gaining access to an end-user machine or network. Attackers try to steal the...

Over 21 Million Stolen Login Credentials of Fortune 500 Companies Available on Dark Web

Dark web forums are the place for cybercriminals to distributing login credentials, malware, and other illicit materials. These dark web forums are not reachable...

State-Sponsored APT Hackers From China, North Korea, Iran Focusing to Develop Android & iOS...

Mobile threats emerge as mobile devices become part of our day to day life. Exploiting mobile devices gives all-in-one means to targeted users' sensitive...