Short Bytes: Microsoft, long known for harbouring different kinds of malware, this time, “unveils” bootkit, a malware which loads even before the Windows...
Lately the threat actors behind Dridex malware have been very active. Across all the recent Dridex phishing campaigns the technique is the same....
Apple has piled on the patches already released by Adobe and Microsoft today, and pushed out updates for iOS, OS X, Apple...
The internet’s root servers came under a concerted distributed denial of service (DDoS) attack last week that effectively knocked three of the...
A recent Facebook phishing scam asks users on the social media giant to verify their page because a suspected page forgery was detected...
After hacking nuclear plants, Refrigerator, House Arrest Ankle Bracelet, Smartphones GPS Signals, Electronic Skateboards, Driverless Cars, Jeep, Computer Controlled Sniper Rifle and Jeep Cherokee etc, it is now time...
Short Bytes: With gitnonymous project, now you can obfuscate your true identity while making Git commits and pushing to public repositories. Using the...
The official Twitter account of renowned Pakistani journalist Hamid Mir has been hacked by an unknown hacker who is now leaking screenshots...
Windows 10 spying on users is not a new thing nor its force downloading tactics but Windows 10’s November update saw marked improvement...
ESET's senior research fellow David Harley explores and discusses the main issues surrounding copyright and social media.
TuneCore, an online music distribution/record label service on Friday, revealed that its database was breached by the hackers and they have been...
Social engineering is a pretty important item in a hacker’s toolkit.in Mr robot there was a time, we see Elliot, using social...
On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch...
At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some...
The flaws can be exploited remotely through emails, Web pages, MMS and rogue apps. Google has released a new batch of security fixes...
Today at JSConf US Last Call in Florida, we announced that we will open-source the core components of Chakra as ChakraCore, which...
BackStab technique helps criminals get their hands on your private data, via unprotected phone backups A recent report from Palo Alto Networks...
Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services...
Leeds United-loving football fans appear to have hacked the Twitter account of WWE legend Jim Ross, and announced his death.
People who download stuff from torrents and other cracked software providing websites have a very bad news because a user recently downloaded...
The government of France is in discussions on blocking Tor anonymity network and also the shared and free wifi network during a state...