Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery...
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that...
Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now,...
Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of...
The US government has started arresting people who are showing support for the so-called Islamic State (IS, previously ISIS/ISIL) on social media. Whether it be...
Short Bytes: A new discovery at the PacSec Conference at Tokyo unveiled a great threat prevailing in the Android OS that hands...
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty...
Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black...
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely...
Avast confirms the recent Vizio Smart TV snooping scandal Security researchers at Avast have hacked a Vizio smart TV and gained access...
Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher...
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online...
More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University,...
One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks...
If you would like to build your personal private chatting system without any hassle besides entering a different Address in your web...
The premium email provider FastMail has revealed that a cybercriminal has launched multiple DDoS attacks on its systems and made a ransom...
Short Bytes: Russia has yet again displayed stifling laws as it demanded the micro-blogging site Twitter to set up local data centres...
Short Bytes: In a blog post, Tor Director has outlined the unethical ways that were employed by FBI to unmask Tor users....
Recently, researchers from the Cheetah Mobile Security Lab have found a dangerous Trojan, dubbed Cloudsota, pre-installed on certain Android tablets. Tablets infected...
Soccer, or rather football aficionados in the UK may have had their computers infected whilst browsing the Premier League’s official fantasy website...