HackRead - Security is a Myth # Around the Web

HackRead is your gateway to the world of the Internet that centers on Technology, Security, Privacy, Surveillance, Cyber warfare, Cybercrime and first hand Hacking News, with full-scale reviews on Social Media Platforms. We are a leading, reliable and authentic news source for core topics related to Technology, InfoSec, Cyber Security, Warfare, and Hacking.

Google kicks out 600 malicious apps from Play Store

By Sudais Asif Google has kicked out 600 malicious apps from Play Store - Here's what happened and why it's good news. This is a post from HackRead.com Read the original (...)

21 February
Private details of 10.7 million MGM Hotel guests sold on Dark Web

By Deeba Ahmed The database on the dark web also includes details of Justin Bieber and Twitter's Jack Dorsey. This is a post from HackRead.com Read the original post: (...)

21 February
Researchers recovered 9 billion email & password combos in 2019

By Sudais Asif To start with data breaches, a total of 640 breaches were recorded resulting in a recovery of over 9 billion login credentials. This is a post from (...)

20 February
Popular YouTube gaming channel hacked to run crypto scam

By Deeba Ahmed The highly popular YouTube gaming channel boasting of 1.88 million subscribers, was hacked over the weekend by unidentified crypto scammers. This is a post (...)

20 February
US Natural Gas-Compression facility cripples after ransomware attack

By Deeba Ahmed Another day, another ransomware attack - This time, hackers have hit critical infrastructure of the government of the United States. This is a post from (...)

19 February
Hackers clone ProtonVPN website to drop password stealer malware

By Sudais Asif Currently, ProtonVPN has more than 2 million users around the world and that makes it a lucrative target for cybercriminals. This is a post from HackRead.com (...)

19 February
Russia Blocks Encrypted Email Service Tutanota

By Deeba Ahmed The open-source encrypted email service Tutanota has been blocked in certain parts of Russia over the weekend. This is a post from HackRead.com Read the (...)

18 February
Plastic surgery tech firm leaks images of 100,000s of customers

By Sudais Asif Another day, another data breach - This time, a plastic surgery technology company has leaked highly sensitive data and as usual, victims of the breach are (...)

18 February
Latest LokiBot malware variant distributed as Epic Games installer

By Deeba Ahmed The new variant of the notorious LokiBot malware is more sophisticated and effective than its previous versions. This is a post from HackRead.com Read the (...)

18 February
Hamas hackers posed as women to con IDF into downloading malware

By Waqas The hackers posed as women to send out malware and receive crucial information about the device as well as controlling key functions of the phone. This is a post (...)

17 February

Latest articles

Security Alert: Sextortion is on the rise

Security Alert: Sextortion is on the rise

Security Alert: Lucrative Scam of Sextortion Is on the Rise. January 21, 2019. The latest report from cybersecurity company Symantec shows that extortion scams are on the (...)


Why the NordVPN network is safe

Why the NordVPN network is safe

Why the NordVPN network is safe after a third-party provider breach. Information has recently surfaced about a NordVPN breach caused by vulnerabilities in a third-party (...)


Rojava : The war has started

Rojava : The war has started

Declaration of the Internationalist Commune: The war has started! We call to RiseUp, to defend Rojava. A few hours ago the fascist Turkish state started its occupation (...)


Matt DeHart is free

Matt DeHart is free

October 3rd 2019: Matt DeHart has been freed from federal prison after serving 2740 day. Matt is transitioning after 8 long years of prison. He will be starting with (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 Port: 6697 - SSL #OpNewBlood
epynixtbonxn4odv34z4eqnlamnpuwfz6uwmsamcqd62si7cbix5hqad.onion
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
3-Year Plan | Discount -70%

Anonymous T-Shirts
Anonymous T-Shirts