Hacked casino operator alleges breach continued while Trustwave was investigating. A Las Vegas-based casino operator has sued security firm Trustwave for conducting...
Security firm Damballa says that when computer crime cops in Norway arrested five men last month in a joint operation with Europol,...
NOT SO LONG ago, the Silk Road was not only a bustling black market for drugs but a living representation of every...
The Ring is a Wi-Fi doorbell that connects to your home Wi-Fi. It’s a really cool device that allows you to answer...
IT’S BEEN NEARLY a year since a jury determined that Ross Ulbricht had created and run the anonymous black market for drugs...
A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed...
Fortinet’s FortiOS operating system, deployed on the company’s FortiGate firewall networking equipment includes an SSH backdoor on versions from the 4.x series...
PrivaTegrity communication network provides secure communication platform and Anonymity — Maybe better than Tor. A new anonymous communication network by the name of...
Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals...
A new type of RAT (Remote Access Trojan) has been discovered in use against governments and civil society organizations in South-East Asia,...
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the...
Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying...
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line...
When it comes to securing homes and businesses, a security camera is a privileged solution but it paradoxical is exposing users to...
Tech industry hits back at plans to create legal framework for hacking by spies, military and police. Tech companies including Apple, Microsoft,...
THE SO-CALLED DARK web, for all its notoriety as a haven for criminals and drug dealers, is slowly starting to look more...
Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts...
A security flaw in Blackphone 1 smartphone allowed anyone to take control of the device Blackphone 1 smartphones, one of many privacy-focused...
A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]....
Malware was infecting machines, adding them to its botnet.Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing...
Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But...