Author: Zeel_Cyberexpert

Many people believe that iPhones cannot be hacked, but cybersecurity experts say this is a myth. While Apple devices are known for strong security protections, no smartphone is completely immune to cyber threats. Both iPhone and Android devices can be compromised under certain conditions. The difference is usually in how the attack happens and how difficult it is for attackers to exploit the device. Understanding how smartphone hacking works is important for anyone who uses a mobile phone for banking, communication, or storing personal data. Why People Think iPhones Cannot Be Hacked Apple has built a reputation for strong security.…

Read More

A growing online debate about the role of artificial intelligence in military systems has led some users to cancel their ChatGPT subscriptions or uninstall the app. The discussion gained attention after reports highlighted concerns about how advanced AI technologies could potentially be used in defense or government-related projects. The controversy intensified after reports of collaborations and discussions involving AI technology and defense research, including projects connected to the U.S. Department of Defense. While AI companies often work with government institutions on various technologies, the possibility of AI tools being linked to military applications sparked ethical concerns among some users. As…

Read More

A ransomware attack on the University of Hawaii Cancer Center has exposed data connected to around 1.2 million individuals, according to an official notice released by the institution. The cyberattack was first detected on August 31, 2025, after suspicious activity was discovered within systems used by the cancer center’s epidemiology research division. Investigators later confirmed that attackers had gained unauthorized access to certain internal systems, encrypted files using ransomware, and also copied data from the network. The compromised information mainly came from historical research datasets used in long-running cancer studies. Some of the affected records include Social Security numbers, driver’s…

Read More

Online scams are evolving quickly, and one of the fastest-growing cybercrimes today is the WhatsApp video call sextortion scam. Thousands of people across India and other countries are being targeted through random video calls from unknown numbers. What looks like a normal call can turn into a serious cyber-extortion trap within minutes. In this scam, criminals try to record compromising video clips and then threaten victims with messages like “Pay money or we will send this video to your family and friends.” Understanding how this fraud works is the first step to protecting yourself. How the WhatsApp Video Call Scam…

Read More

UK Privacy Regulator Imposes £14.47 Million Fine on Reddit The United Kingdom’s data protection regulator has fined social media platform Reddit £14.47 million ($19.6 million) after finding that the company failed to adequately protect children’s personal data and did not implement sufficient age-verification safeguards. The penalty was issued by the Information Commissioner’s Office (ICO) following an investigation into how the platform processed personal data belonging to underage users. Investigation Reveals Weak Age-Verification Controls According to the regulator, Reddit did not deploy strong mechanisms to determine whether users accessing its platform were minors. As a result, children were able to access…

Read More

Recent geopolitical developments in the Middle East have prompted U.S. financial institutions to strengthen their cybersecurity monitoring and preparedness. Security experts warn that periods of international conflict often lead to an increase in cyber activity targeting critical infrastructure. According to industry analysts, banks and financial organizations are currently paying close attention to potential cyber threats that could originate from groups aligned with Iran. These threats may include disruptive actions such as Distributed Denial-of-Service (DDoS) attacks, which attempt to overwhelm servers and temporarily disrupt online services. The financial sector is considered one of the most attractive targets for cyber operations because…

Read More

U.S.-based wealth management firms Mercer Global Advisors and Beacon Pointe Advisors have become the latest financial advisory organizations linked to a cyber intrusion attributed to the hacking group known as ShinyHunters. Cyber threat intelligence platforms observed that data allegedly connected to the firms was being circulated within underground cybercriminal communities. The threat actors behind the activity are known for breaching corporate systems and leveraging stolen information for financial extortion. Security researchers monitoring dark web forums reported that the group claimed to have accessed internal databases containing client-related and operational records. While the authenticity and scope of the data are still…

Read More

Several Iranian government websites and widely used mobile applications reportedly experienced service disruptions following recent U.S.–Israel military strikes. Experts are monitoring potential geopolitical cyber implications. Several government-linked websites and widely used mobile applications in Iran experienced temporary service disruptions following recent military strikes carried out by the United States and Israel, according to international media reports. Multiple online platforms reportedly became inaccessible for a period of time, while some users noticed irregular behavior on certain digital services. Cybersecurity observers noted unusual traffic patterns during the same timeframe, raising questions about possible coordinated digital activity. At this stage, there has been…

Read More

India’s Department of Telecommunications (DoT) has enforced a new SIM-binding rule starting March 1, 2026. The directive applies to messaging platforms that use mobile numbers for user authentication, including WhatsApp, Telegram, Signal and similar apps. The order was originally issued on November 28, 2025, giving companies 90 days to comply. What Is SIM-Binding? Currently, most messaging apps verify users using a one-time password (OTP) sent to their registered mobile number during sign-up. After verification, the app can continue functioning even if the SIM card is removed or deactivated, particularly in multi-device and web versions. Under the new SIM-binding rule: The…

Read More

A 45-year-old farmer from Rajkot has filed a complaint with the cybercrime police after allegedly losing ₹24.78 lakh in a work-from-home scam. The case highlights the growing risk of online job fraud targeting individuals through messaging platforms. According to the complaint, the victim was approached with an offer for part-time online work promising easy earnings. Initially, small amounts were credited to build trust. Later, he was asked to deposit money to “unlock higher commissions” and complete assigned online tasks. As the process continued, he was repeatedly instructed to transfer larger sums under different pretexts, including processing charges and account verification.…

Read More