Kid hacker renames school on Google My Business page as ‘strip club’
Although we’ve been through the pandemic for atypical months, the end of the school year in New Zealand is coming and thousands of students seem to be in good spiritsRead More →
Although we’ve been through the pandemic for atypical months, the end of the school year in New Zealand is coming and thousands of students seem to be in good spiritsRead More →
Important players in the largest social media and technology companies are driving an initiative to replace any commonly used term that associates the word “black” with a negative connotation. ThisRead More →
Instagram is one of the most popular social media platforms, so it is very common for hackers and scammers to use it to search for new victims of multiple variantsRead More →
A group of cybersecurity specialists has revealed an interesting finding related to automotive firm BMW and its customers in the UK. According to the researchers, a hacking group identified asRead More →
A team of cybersecurity specialists discovered that LinkedIn can access data stored on the iOS device clipboard without users’ consent. According to the report, this reprehensible behavior was detected thanksRead More →
Cybersecurity specialists discovered a Windows point-of-sale (POS) malware that uses the DNS protocol to smuggle stolen credit cards, sending them to remote servers under the control of cybercriminals. This malwareRead More →
Social media scam campaigns and electronic platforms are becoming a common problem, and scam operators are always looking for new topics to attract unsuspecting users. Over the past week, hundredsRead More →
A group of cybersecurity specialists has revealed the detection of multiple attacks related to the exploitation of an old Microsoft Office flaw (tracked as CVE-2017-11182). This flaw, patched in 2017,Read More →
Malicious hacking has become very common, so all tech users are exposed to cyberattacks. While there are multiple gangs or individuals with few minimal resources or skills trying to engageRead More →
© 2025 All Rights Reserved
info@iicybersecurity.com