Phishing campaign targets HMRC to steal login and payment data

Phishing is the fraudulent attempt to acquire sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising...

Peekaboo Zero-Day Vulnerability Permits Hacking of Surveillance Cameras

Security cameras of IoT that represents various vendors invite opportunities for flaws. Recently, researchers have discerned a similar vulnerability that lets hacking of surveillance cameras....

Modern laptops are vulnerable to cyber attacks- experts

When we buy laptops or computers we only look after its version, Storage and other technical aspects but never think about its capacity to...

 A to Z Online Training Pack for learning ethical hacking

Here comes good news for everyone who aspires to learn ethical hacking online. This week THN deals has brought Ethical Hacking A to Z...

Digital Sex Crime, Inside the Fight Against Revenge Porn

For years Kara Jefts lived with a dreadful secret. Jefts do not reveal her last name when she met a guy for the first,...

Wifi Pumpkin – Wifi Security Audit Framework

The security audit framework used to test the security of wifi against threats like the man in the middle attacks is known as Wifi...

Most Common IT Security Mistakes People Make

There different kinds of simple and common mistake that computer users make usually. Those kinds of mistakes are often neglected. Avoiding such mistakes threats...

Data breach of British Airways exposes customer’s payment card details to...

Earlier this week British Airways admitted to a sad occurrence that happened somewhat similar to the Air Canada data breach.  According to their report,...

261,000 customers of Atlas Quantum suffered after major data theft

Recently, Cryptocurrency trading platform Atlas Quantum stated on its Facebook page that it has suffered a major data theft that compromised personal details of...

MagentoCore Malware Steals Payment Card Details

Cybercriminals are targeting websites running the Magento platform to inject them with code that can steal credit card data and infect visitors with malware,...

“Cyber security incident response capabilities in the financial sector”

Recently large-scale security breaches have highlighted a new class of threat to digital networks. Advanced Persistent Threats (APTs) have made global headlines, to the...

Turkish hacktivists targets social media account of journalists

Recently, the Twitter account of NBC national correspondent Peter Alexander appears to have been hijacked by hackers claiming to represent Turkey’s “cyber army.” For at...

Fine of 170 million demanded in call bypass case

A complaint has been filed in Chitwan District Court, with the demand of fine worth 170 million for bypassing the call.   The police have...

Pokhara university computer hacked dramatically

The computer of Pokhara University exam department has been hacked dramatically. The person who was supposed to measure the furniture hacked the computer that...

Learn to Protect Your Organization from Spear Phishing

Spear Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic...

Hacker threats government websites

Recently few governmental sites have faced some sort of trouble and issue. Expert claims that those issues are probably a threat by the hackers....

Nepal involves highly in Tor and dark web

A study found that there are about 500 connections per day to Tor from Nepal. Tor is free software for enabling anonymous communication which provides access to...

Securing online presence, read more for detail information

The issue of data protection hyped up after Facebook user’s personal data was shared for the use of election manipulation by Cambridge Analytica. The...

Drupal team acknowledges serious vulnerability in CMS Drupal 

ThreatNix reports, the Drupal team publicly acknowledged a serious vulnerability in the open source CMS Drupal on March with the release of a patch...

Steps to secure government issued email

Recently, the government of Nepal has mandated the compulsory use of email in all the government workstation. The rule came up under a government...

 ThreatNix appends IS audit service

ThreatNix a company which is specialized in providing cyber security related service has added a new amenity in its working list. The company has...

Nepal Police brings Digital Forensics Technology in use

Like we need bread and butter for our survival the essentiality of digital forensic has escalated immensely for all the cyber guards. From last few...

The 10 major Windows security vulnerabilities

Almost all of the windows networks have number of security holes. Luckily many of these holes can be repaired quickly and easily before they...

Stranger’s messages threatens cyber security

The use of social networks is increasing in the same way as the cyber attacks are burgeoning. To discover someone’s personal data has been a...

Is your phone call being recorded? Read more to know

Nepal Telecom claims that it doesn’t have a system to record phone calls made from landline telephone and mobiles. An official of NTC informed authority...

Parliamentarian in Hacker’s trap

Recently parliamentarian Prem Bahadur Ale’s Facebook account was hacked. The hackers have been asking for the recharge card pin to the Ale’s close friends...

NTA ensures to find lost mobile within a week, how? Read...

Here is the good news for everyone who is always scared of losing their mobile phone. From now onwards you don’t need to worry...

Nepal in high risk of cyber attacks

Context of cyber security in Nepal. As the public of Nepal is still not much aware of cyber security, cyber attackers from foreign land have...

2018 Cyber Security expert’s prophecy

The Economic Times states Cyber Security as the techniques for protecting computers, networks, programs and data from unauthorized access or attacks that are aimed...

2018 Checkpoint Threat Report, The Future of Cyber Security

Check Point Infinity architecture delivers consolidated Gen V cybersecurity across networks, cloud, and mobile environments. Download 2018 Security Threat Report - CHECKPOINT