Skip to content
  • Events
  • Cyber Laws
  • Case Studies
  • Contact
  • Facebook
  • Twitter
  • Youtube
  • LinkedIn

Cyber Crime Awareness Society

Harbinger of war against cyber crime

Primary Menu
  • Cyber Crime News
  • Trending Frauds
  • Case Studies
  • Definitions
  • Tutorials
  • Laws
    • Cyber Laws
    • IPC
  • Events
Exclusive
Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala What is phishing? What is phishing? Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification. Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Cyber Crime News

Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

By CCAS / January 6, 2022
of
Cyber Crime News

Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

By CCAS / January 22, 2022
Cyber Crime News

What is phishing?

By CCAS / January 10, 2022
Malware attacks can bypass patches for critical MSHTML flaws with a new exploit.
Cyber Crime News

Malware attacks can bypass patches for critical MSHTML flaws with a new exploit.

It was observed that a short-lived phishing campaign exploited an exploit that bypassed a Microsoft

By CCAS / December 22, 2021
Cyber espionage hackers from Tropic Troopers target the transport sector.
Cyber Crime News

Cyber espionage hackers from Tropic Troopers target the transport sector.

A sophisticated and well-equipped cyberespionage group has been targeting the transportation industry and government agencies

By CCAS / December 22, 2021
More than 5 lakh android user’s affected by “JOKER” a new malware
Cyber Crime News

More than 5 lakh android user’s affected by “JOKER” a new malware

A malicious Android app has been found with more than 500,000 downloads from the Google

By CCAS / December 21, 2021
Vulnerabilities in mobile networks affect all cell generations, including 2G.
Cyber Crime News

Vulnerabilities in mobile networks affect all cell generations, including 2G.

In a recent paper, researchers disclosed security vulnerabilities in handover, a mechanism that supports modern

By CCAS / December 21, 2021
Facebook has banned seven “cyber mercenary” firms for spying on more than 50,000 users.
Cyber Crime News

Facebook has banned seven “cyber mercenary” firms for spying on more than 50,000 users.

In the wake of mounting scrutiny of surveillance technologies, Meta Platforms announced on Thursday that

By CCAS / December 20, 2021
An Expanded Attack Surface for Log4j Vulnerability with a New Local Attack Vector.
Cyber Crime News

An Expanded Attack Surface for Log4j Vulnerability with a New Local Attack Vector.

Researchers have discovered an entirely new means of exploiting the Log4Shell vulnerability locally by using

By CCAS / December 20, 2021
Wi-Fi and Bluetooth chips are vulnerable to new coexistence attacks.
Cyber Crime News

Wi-Fi and Bluetooth chips are vulnerable to new coexistence attacks.

Researchers at the University of California San Diego have discovered how Bluetooth can be used

By CCAS / December 17, 2021
Hackers to be paid by Facebook for reporting data scraping bugs and scraped datasets.
Cyber Crime News

Hackers to be paid by Facebook for reporting data scraping bugs and scraped datasets.

The company formerly known as Facebook has announced an expansion of its bug bounty program

By CCAS / December 16, 2021
New patch released for vulnerability (CVE-2021-45046) found in Log4j.
Cyber Crime News

New patch released for vulnerability (CVE-2021-45046) found in Log4j.

The Apache Software Foundation (ASF) has released a new patch for the Log4j logging utility

By CCAS / December 16, 2021
Ransomware Affiliate 51 stolen data brokes arrested in ukraine romania.
Cyber Crime News Uncategorized

Ransomware Affiliate 51 stolen data brokes arrested in ukraine romania.

As part of Europol’s ongoing cybercrime investigation, a third Romanian national was arrested on suspicion

By CCAS / December 15, 2021

Posts navigation

Older posts
Newer posts

Recent Posts

  • Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala
  • What is phishing?
  • Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
  • Remote hacking is possible for Garrett walk-through metal detectors.
  • Code Signing Certificates are being used by new BLISTER malware to avoid detection.

Categories

  • Case Studies
  • Cyber Crime News
  • Cyber Laws
  • Definitions
  • IPC
  • Laws
  • Trending Frauds
  • Tutorials
  • Uncategorized

Categories

  • Case Studies (3)
  • Cyber Crime News (53)
  • Cyber Laws (37)
  • Definitions (17)
  • IPC (3)
  • Laws (9)
  • Trending Frauds (15)
  • Tutorials (20)
  • Uncategorized (1)
  • Popular
  • Latest
  • Trending
  • Definitions

    Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    British Charity Loses Over $1m in Domain Spoofing Scam

    By CCAS / February 3, 2020
  • Cyber Laws

    Laws for Cyber Defamation

    By CCAS / February 4, 2020
  • Cyber Crime News

    ALERT: ‘Martinelli’ hoax reappeared

    By CCAS / March 26, 2020
  • Cyber Crime News

    Dhaka Police arrests Turkish ATM hacker six months after escaping from Agartala

    By CCAS / January 22, 2022
  • Cyber Crime News

    What is phishing?

    By CCAS / January 10, 2022
  • Cyber Crime News

    Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.

    By CCAS / January 6, 2022
  • Cyber Crime News

    Remote hacking is possible for Garrett walk-through metal detectors.

    By CCAS / December 28, 2021
  • Cyber Crime News

    Code Signing Certificates are being used by new BLISTER malware to avoid detection.

    By CCAS / December 27, 2021

How to do sms bombing or spamming? How to secure ourselves from spamming?

https://www.youtube.com/watch?v=e6hYGGm5QG0&t=5s

How to create Whatsapp with fake numbers? How to track person using whatsapp with fake number?

https://www.youtube.com/watch?v=98wODnI1U04&t=14s

Categories Cloud

Case Studies (3) Cyber Crime News (53) Cyber Laws (37) Definitions (17) IPC (3) Laws (9) Trending Frauds (15) Tutorials (20) Uncategorized (1)

Direct links

  • Careers
  • Contact

Cyber Crime Awareness Society

Harbinger of war against cyber crime

  • Facebook
  • Twitter
  • Youtube
  • LinkedIn
Copyright © All rights reserved. | Designed by Avenging Security Pvt Ltd.