Alert: The previously discussed Steam Stealer malware is way bigger than we thought — The malwarE is also embedded with a remote...
A huge leak of confidential documents has revealed how the rich and powerful use tax havens to hide their wealth. Eleven million...
The fix? No patch, just destroy all extensions. Black Hat Asia The most popular Firefox extensions with millions of active users are open...
The Rokku Ransomware is a new infection currently being spread in email attachments. When infected, a victim’s data files will be encrypted and...
Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two of security...
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the...
Lauri Love faces extradition to US over hitting Federal Reserve, among others. At a court hearing earlier this month, the UK’s National Crime...
FOR THE PAST few years, Trevor Paglen has been at the vanguard of a movement of fine artists who have led gallery-goers...
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command...
Security researchers from SentinelOne have discovered a security vulnerability affecting the Apple System Integrity Protection (SIP). Security researcher Pedro Vilaça from SentinelOne...
The United States Marine Corps has launched on March 25th a new hacker support unit named Marine Corps Cyberspace Warfare Group. It is...
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet,...
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday...
FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting...
Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites. In...
In-brief: Andrew Auernheimer, an online provocateur who uses the handle “Weev,” has taken credit for causing 30,000 Internet connected printers to spew...
The websites and web applications are mission-critical business systems that must operate without security problems to process corporate confidential information. And to...
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its...
The Carbon Black Threat Research Team has recently discovered a new family of ransomware, which they dubbed “PowerWare,” that targets organizations via...
A new ransomware has been discovered by security researcher Yonathan Klijnsma called Maktub Locker that shows the most attention to detail that I have...
Researchers say that wireless mouse could expose billions of computers to hacking Bastille Networks, a startup cyber security company that looks to better...