Twelve municipal guards in the city of Araraquara (273 km from Sao Paulo) Brazil have been suspend from their jobs of monitoring...
The official website of Nigerian Federal Ministry of Finance (http://www.fmf.gov.ng ) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. Hackers left a...
A leaked two-page pamphlet for NSA employees reveals the organization instructed each employee on some key “talking points” to bring up in...
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Your next PC password could be President Bill Clinton kissing a fish - and that disturbing mental image, and similar surreal “story...
NSA banks on Google cookies for pinpointing hacking targets. Google cookies which are utilized by advertisers to track consumers are also being used...
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting...
All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as...
A UK citizen has sued Microsoft for leaking PRISM private data to the NSA. A UK court will be carrying out an action...
A hacker from United States has managed to devise method to Hijack or take control of Consumer drones. This will enable the...
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker...
FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners....
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area...
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC...
A Turkish based hacking group going with the handle of ‘Ayyıldız Tim’ (Ayyıldız Team) has hacked and defaced the official website of United...
Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security...
APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Built to be stealthy, they...
As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers - either stealing information, or...
Microsoft's telepathic power, of course, comes from AI, not magic, and illustrates very clearly which passwords are easy for a computer to...