A China-based APT group has an insatiable appetite for stolen code-signing certificates. Many security-minded organizations utilize code signing to provide an additional layer...
Short Bytes: The decentralized hacktivist group Anonymous has again tied their shoelaces to run after the Republican Presidential candidate Donald Trump. In...
TOR’s Anonymity Promise Slashed- Users can be Tracked with their Mouse Movements! TOR is used by probably millions of Internet users simply...
Attack ATM is very simple for criminals, a video released by Miami Beach Police shows two men installing a credit card skimmer...
Two teenagers were behind the whole hacking scheme. At the end of last week, Dutch police arrested two suspects on allegations of hacking...
In 2014, Redmond reckoned Bitcoin was the future. It once also said that about Zune. Back in November 2014 Microsoft announced that it...
This is a how to to change any user password on a windows 7 computer. If you forgot your password you can...
Short Bytes: While TOR software suite promises enhanced privacy and security, researchers have found new ways like TOR user fingerprinting to unmask...
Flash, I love you, but we only have fourteen hours to save everyone’s computers. Adobe has urged users to patch their Windows, OS...
This hack can boot Linux on PlayStation 4 This is not the first time that fail0verflow announced it had successfully hacked Sony’s PlayStation...
A security researcher has devised a new technique to track users by analyzing the mouse movements, even when surfing on the Tor...
A group of security researchers from the Edinburgh Napier University elaborated a new DDoS amplification technique relying on the TFTP protocol. A...
Printed electronics makes the perfect fake fingerprint. Boffins from Michigan State University have loaded up an inkjet printer with cartridges designed for printing...
It appears that the KeRanger Mac ransomware has roots in Linux, not Windows, as many were expecting to. A big surprise was revealed...
Step 1. Simply take over a victim’s mobile phone number. NatWest is tightening up its internet banking systems after security shortcomings were exposed...
Federal Reserve officials deny the incident took place. Serious accusations have been made today by Bangladesh’s central bank, which has said that hackers...
Craig Smith does car hacking as safely as possible. The softly-spoken security researcher doesn’t take risks like cutting cars’ power on public roads, as...
ome users might be able to remove KeRanger before it starts its encryption process and locks up all their files. Yesterday, the first...
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video...
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has...
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware...