Researcher also launches a DoS attack on the car’s computer. A professor at Hiroshima City University was able to hack an Internet-connected car...
The Tokyo Metropolitan Police Department has taken maintaining law and order to another level: it uses a massive drone to catch other...
Image | fossBytes Short Bytes: A group of teenage hackers has traced multiple ISIS Twitter accounts to the UK Government’s Department of...
VTech site remained vulnerable to an old SQL injection exploit. UK police said they have arrested a 21-year-old man in connection to...
ZOMBIE ARMIES AREN’T just invading movie screens these days. They’re also taking over the Internet in the form of massive botnets. A...
There is an increase in people who have been victims of identity theft and unauthorized use of credit cards because of many...
Scammers have been targeting Microsoft customers since the very first day — The only change in their tactic is that it’s getting...
Nowadays, every individual who uses the internet is well aware of IP and MAC addresses but for those who don’t, MAC address...
Anonymous is known for conducting cyber attacks against injustice but not every operation makes it to the news — There are several...
Europol have been working alongside a number of European law enforcement authorities in an attempt to crackdown against the use of Remote...
ShortRead: MacKeeper, a utility software suite for Mac OS X faced a data breach which has exposed details in relation to its...
Image | GCHQ Short Bytes: NSA’s British counterpart GCHQ has just open sourced its spying tool named Gaffer. The software is written...
Japanese company “Secom” has developed a drone that could be tough to handle for intruders trying to escape after committing any crime....
Image | fossBytes Short Bytes: A hacker from Anonymous collective has come forward to explain how Anonymous locates ISIS-affiliated Twitter handles and...
Attackers carry out SMS fraud via the infected phones. The Android/OpFake and the Android/Marry malware families, two banking trojans targeting mobile devices, have...
Leaky database server left exposed online is at fault.For the past few weeks, security researcher Chris Vickery has been working on discovering...
Short Bytes: The notorious macro malware from the 1990s is making a comeback in a big manner. The latest security reports suggest...
The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal...
Today’s arrests are part of a co-ordinated Europol initiative to crack down on all levels of computer crime. Norway’s Kripos national criminal...
Wave of attacks grows. Researchers advise sites to install just-released patch. Attackers are actively exploiting a critical remote command-execution vulnerability that has...
A new research has found out that numerous parking applications available in the smartphone market contain strong vulnerabilities that can allow hackers...