Hack

Iran's Melli, Sepah banks reported outages, service disruptions, IRGC-linked media report

Iranian authorities did not comment on whether the bank outages were caused by a cyberattack or were coincidental.

A man walks past another using an ATM machine of Iran's Melli Bank in Tehran on February 21, 2026; illustrative.
FBI agents monitor suspicious activity; illustrative.

FBI 'identified and addressed' suspicious cyber activity on its networks, agency spokesperson says

ON THE front line of the cyber war, Israel has become one of the world’s most targeted countries for cyberattacks, with state-backed hackers increasingly using AI to probe government networks, companies, and critical infrastructure.

How Israel's cyber chief is navigating through the dystopian cyber-AI period - exclusive

Iran’s Crown Prince Reza Pahlavi, with the Iranian, Lion and Sun flag.

Iranian state TV hacked with message from Crown Prince Pahlavi as regime tightens media control


Introducing the new toy hackers are using that's worrying authorities

At first glance it looks like a video game, but this device allows hacking, stealing and tampering with information, like a Swiss army knife for hackers.

Cyber hacking (illustrative)

Can Israel Police find the right balance between security and privacy? - analysis

People who are worried about police hacking their cell phones have every right to be concerned.

NSO Group logo is shown on a smartphone which is placed on a keyboard in this illustration taken May 4, 2022.

Do you have stained clothing? This cleaning guru revealed how to remove stains easily

The mother of two boys, one of on TikToker revealed her secrets for removing stains. She took two of her sons stained shirts and demonstrated how a few simple steps before doing the laundry.

PARENTS SHOULD read labels and look for items that are free of dye and perfume, and consider natural cleaning products instead of chemical alternatives.

Cybercriminals find new ways to seem legitimate: How can we spot them? - McAfee

Technology has become more advanced, and scammers have clocked on and are taking full advantage. McAfee's report explained how to spot the scams.

 The McAfee logo is displayed at the Mobile World Congress (MWC) in Barcelona on February 25, 2019.

Spain authorizes extradition of Briton who allegedly hacked Netanyahu, Biden

The accounts of Elon Musk, Barack Obama, Kim Kardashian, Bill Gates, Warren Buffett, Jeff Bezos, Michael Bloomberg and Kanye West were also hit.

22-year-old British citizen Joseph James O'Connor is led by Spanish police officers as he leaves a court after being arrested in connection with an alleged July 2020 Twitter hack that compromised the accounts of high-profile politicians and celebrities, according to the US Justice Department.

Can Israel stop ex-intel agents from breaking human rights, democratic elections? - analysis

How can the Jewish state prevent its former intelligence agents from using their skills in the private sector in violation of human rights and democratic elections?

 Israeli perspective on artificial intelligence (Illustrative).

Israel Securities Authority: Cyber threats have become a significant risk

The ISA is now requiring that the cyber risk assessment and disclosure process regarding cyber incidents experienced by corporations be more in-depth.

 Cyber attack

These 11 hotel room hacks will save you time and money

A flight attendant gave useful tips on how to make your next stay in a hotel as smooth as possible.

 Illustrative image of a hotel room.

Italy sounds alarm on large-scale computer hacking attack

Servers had been compromised in other European countries such as France and Finland as well as the US and Canada.

HACKERS AND cybersecurity

Russian cyberattacks on Ukrainian infrastructure redefine the game

Moscow is attempting to make its hacking sprees as psychologically difficult for Ukrainians as possible.

 A Russian flag is seen on the laptop screen in front of a computer screen on which cyber code is displayed, in this illustration picture taken March 2, 2018.