Short Bytes: In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown...
Good news for security researchers you can now earn some good money by reporting security bugs to Malwarebytes — Thanks to its...
DMA Locker is another ransomware that appeared at the beginning of this year. For now it has been observed to be active...
Wikileaks founder Julain Assange can be a free man this Friday — His fate depends on the decision from United Nation’s Working Group...
Microsoft has been accused of pushing Windows 10 rather aggressively, and the company’s latest move is going to do nothing to silence...
JUST WHEN THE Silk Road’s saga of dirty money and double-dealing seemed to be winding down, one of the federal agents who...
A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government...
Security researcher Chris Vickery has discovered that hackers can abuse HP LaserJet Printers and host malicious files on their hard drive. The famous...
Security experts at FireEye are warning attackers can exploit the JSPatch hot patching technique to serve malicious code and put iOS users...
Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused...
Short Bytes: According to the latest documents provided by Edward Snowden to The Intercept, NSA and GCHQ were involved in surveillance activities...
WhatsApp is working on making your chats more secure by introducing end-to-end encryption along with a much deeper Facebook integration. A developer...
Recently we came across a new family of cross-platform backdoors for desktop environments. First we got the Linux variant, and with information...
MediaTek may not be on the short list of SoC companies whose chips you seek out when buying a new phone, but...
Short Bytes: Tor Browser 5.5 is the first stable release in the 5.5 series of Tor. It is released for all the...
Facebook patched the issue in about six hours. British security researcher Jack Whitton has identified a critical XSS (cross-site scripting) vulnerability on Facebook...
In 2013, the Australian government was accused of spying on Indonesia thanks to the documents leaked by Edward Snowden. Now, it looks...
New Hacking Tools To Come Preinstalled With BackBox Linux 4.5 Security-Oriented OS. The release of BackBox Linux 4.5 has been announced by...
Lenovo Security Advisory: LEN-4058Potential Impact: Remote browsing of file system, unauthorized access of transferred files and denial of service attack that could crash the...
A new ransomware has been spotted called 7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin...
Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a...