Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data...
A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.
A new worm is infecting routers in order to commit social networking fraud, hijacking victims' internet connections in order to "like" posts...
Creating fake social media accounts has been the favorite trick of hackers and scammers for interacting with potential victims. However, thanks to...
A high school boy might have to face state and federal charges for allegedly hiring a third party and launching a DDoS...
From using PCs and cell phones to watch online movies and playing games, wireless technology has advanced greatly and made life easier...
Reportedly BitFinex was hacked but due to strict security measures implementation just minimal amount was lost. BitFinex keeps more than 99.5% of...
It would not be an exaggeration to say that the present age is the age of smartphones. They have invaded our lives...
Do you know that not all web sites honor the native Do Not Track feature of your web browser? Even in the...
Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.
Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless...
As a result of a midnight session, the American Senate has voted down the USA Freedom Act- the basis of NSA’s mass...
The online hacktivist Anonymous breached into the official website of Thailand Senate and Public Health Ministry, ending up leaking login credentials against country’s alleged...
The anti-Bashar Al Assad hacker from Syria hacked into the official website of Uzbekistan Embassy in Kuwait and demanded governments around the world...
When it’s about performing surgeries on vital organs, today’s advanced imaging techniques such as CT scans, MRIs and ultrasound machinery have made...
It’s a high point for “Biometric technology” as in the latest advancement now. It is possible to record data about an individual’s...
An Adult Dating website AdultFriendFinder is the newest victim of a huge hack that exposed the personal information, with sexual orientation details,...
A big day in the history of animal prostheses has arrived, Turkey’s medical 3D printing company provided an injured turtle with a...
The net neutrality debate continues to evolve and now the common people have a better understanding of the topic. Here at fossBytes,...
Yemen Cyber Army claims it breached into the Saudi Ministry of Foreign Affairs server and leaked plain-text login credentials of Saudi officials...
Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.