Headlines
  • On Monday at 14:00 GMT, the US military says it would start blockading Iranian ports, preventing ships from entering or leaving Iran from passing through the Strait of Hormuz.
  • In the southern town of Biyyada, Hezbollah claims that its men have attacked Israeli soldiers with "a swarm of attack drones."
  • US President Donald Trump's threat to block the Strait of Hormuz was deemed "ridiculous" by Iran's navy chief, Shahram Irani.
  • Any military ships approaching the Strait of Hormuz "will be considered a violation of the ceasefire and will be met with severe force," according to a statement released on Sunday by Iran's Islamic Revolutionary Guard Corps (IRGC).
  • The speaker of Iran's parliament Mohammad Baqer Ghalibaf ​ is leading the delegation that has arrived to Pakistan for talks with the United States.
  • Nawaf Salam, the prime minister of Lebanon, stated that he was working to ensure the withdrawal of Israeli forces and to put an end to the Israel-Hezbollah conflict.
  • Viktor Orban, the longtime prime minister of Hungary, has conceded defeat to Peter Magyar in the country's legislative election.

More Details

WhatsApp Scam Stay Alert from Con Artists

In wrong number scam the fraudster spoofs their identity and purposefully calls or messages your phone number. They might strike up a cordial chat with you, inquire about private matters to obtain private information, or promote a fake investment opportunity.

In wrong number scam the fraudster spoofs their identity and purposefully calls or messages your phone number. They might strike up a cordial chat with you, inquire about private matters to obtain private information, or promote a fake investment opportunity.

Cybercriminals pose as representatives of legitimate companies and send you a message claiming you have won a giveaway, a prize, or the lottery. A link to claim the alleged reward is typically included in these mails. But the link takes users to a fake website that asks for personal information, a payment to claim the prize, or confirmation of their bank and credit card information. 

A WhatsApp account with an official appearance invites you to upgrade to WhatsApp Gold. It’s possible that the invitation contains a link that leads to a fake website or infects your device with malware. When you click on such a link, the fraudster may gain access to your phone, which they can use to steal confidential data and even fake messages to your contacts.Scammers posing WhatsApp customer care agents are involved in tech support scams. To assist secure your account, these “representatives” will require you to provide identification.So beware of these WhatsApp scammers.

It is common for scammers to attempt build a cordial, possibly romantic relationship with you prior to presenting a bitcoin plan. They will request that you transfer funds to a cryptocurrency trading platform.Verify that the person you meet online is a real person and not an imposter.Reverse image search of the profile picture can indentify whether the profile is real or fake.

Someone pretending to be a recruiter from a reputable company sends you messages on WhatsApp about a job opportunity, even if you have never applied for it.Flexible work schedules, and a substantial pay paid via an encrypted wallet are all promised by the con artist. After you have a chat with them, they begin to offer you several tasks and say you can easily make money by completing the tasks.

Related Article

Computer Incident Handling

Businesses and organizations can create an effective strategy to guarantee cybersecurity by using in ...
April 13, 2026

Discretionary Access Control (DAC)

With discretionary access control (DAC), the owner of an object has the authority to decide who can ...
April 10, 2026

Malvertising

Malvertising, often known as malicious advertising, is a cyberattack technique that inserts maliciou ...
April 9, 2026

Spoofing and How to Prevent

Cybercriminals use a method called spoofing to pass off malicious communication or activity as from ...
April 8, 2026

Pharming

Pharming is a type of social engeneering cyber attack that uses malicious code to trick victims into ...
April 7, 2026

HoneyMonkey

HoneyMonkey is an automated system which scans various websites on the Internet using a network of c ...
April 6, 2026

Other Article

Prevent Cyber Crime

Computer Incident Handling

Businesses and organizations can create an effective strategy to guarantee cybersecurity by using in ...
April 13, 2026
News & Views

US to Set Up Philippines Fuel…

Washington is planning a fuel depot in the southern Philippines that could support humanitarian and ...
April 11, 2026
Pick of the Day

Press Briefing on Humanitarian Situation in…

Edem Wosornu, Director of the Crisis Response Division in the Office for the Coordination of Humanit ...
Bizzare News

Texas Woman Sentenced to Six Years…

After pleading a guilty plea to mailing synthetic cannabinoids and other drugs into facilities run b ...
April 10, 2026
Pet Corner

Coton de Tulear Dogs Breed

The Coton de Tulear is a small white dog breed that originated in Madagascar and is named after the ...
Prevent Cyber Crime

Discretionary Access Control (DAC)

With discretionary access control (DAC), the owner of an object has the authority to decide who can ...

Top