IN AN AGE when hackers hire themselves out to organized crime schemes and sell secret intrusion techniques to spy agencies, Samy Kamkar...
Fixed by Microsoft’s latest patches, bug could be “enterprise killer,” says researcher. One of a heaping collection of critical bug fixes pushed...
Backdoor in NetScreen firewalls gives attackers admin access, VPN decrypt ability. An operating system used to manage firewalls sold by Juniper Networks...
Last New Years Eve, a hacking group “Lizard Squad” spoiled the party for gamers with a DDoS attack on the Play Station...
Hiroyuki Inoue, associate professor at Hiroshima City University’s Graduate School of Information Sciences in Japan showed how an app and a custom...
When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about...
Image | Flickr Short Bytes: Pressing the backspace key repeatedly 28 times can allow you to exploit a bug in the Grub2 bootloader....
Trio of threats assaults unsuspecting Comcast Xfinity users. Some users visiting the Comcast Xfinity portal faced a triple threat these past days, being...
Today, Rapid7 is disclosing several vulnerabilities affecting several Network Management System (NMS) products. These issues were discovered by Deral Heiland of Rapid7...
TeslaCrypt ransomware infections continue to surge. We reported last week about the first signs of a new TeslasCrypt ransomware campaign that was slowly...
A court in Brazil has ordered the mobile phone operators on Wednesday to block the WhatsApp messaging application throughout the country for...
ShortRead: Why the loss of identity online can lead to severe consequences, no matter how solid and reliable your preventive measures...
There are a hundred types of malware hidden inside the Bible and Quran apps, most of which are available all over the...
Image: fossBytes Short Bytes: A Tails live-USB is like a security-focused computer in a tiny box. Edward Snowden used the same OS...
ShortRead: A group of researchers have developed a system which can hack and steal data from any smartphone user. Today, one of...
Short Bytes: In a recent interview with the VICE, Peter Sunde, co-founder, and ex-spokesperson for The Pirate Bay expressed his thoughts and...
Short Bytes: A new study has surfaced which claims the yearly earnings to the pirates to be around $70 million/year. Digital Citizens...
Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive...
Image | AngularJS Blog Short Bytes: Google has released the beta version of its AngularJS 2 framework. The 2.x branch of the...
ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware...
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security...