As the dates for the Black Hat and Def Con Hacking Conference are approaching closer and closer, we are hearing more and...
Recently we reported that some security researchers managed to hack into the Jeep’s onboard entertainment system to remotely take over the vehicle’s...
Pakistan Telecommunication Authority has ordered the local cellular operators to completely shut down Canadian smartphone maker’s BlackBerry Enterprise Services (BES) by the...
We have heard about hacking websites, computers, planes, and other devices, but hacking a moving car? Well, it happened and it happened live....
Millions of Windows XP users are now left vulnerable to malware attacks as Microsoft has decided to terminate support and security updates...
We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up...
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have...
The LG Update Center Application faces yet another threat of cyber attack as was discovered by SEARCH-LAB Ltd in November 2014. A...
Last week we reported hackers are developing Android malware every 17 seconds, making it one of the most vulnerable OS ever. Now...
The mysterious message Tweeted by Anonymous, the widely known hacktivist group, has left many wondering whether they were behind the cyberattack on NYSE,...
The infamous spyware dealer, Hacking Team, has now begun to complain that their recently leaked Remote Control System (RCS) spyware tool which...
We all know that one of the basic procedures to keep our computer system secure and free from viruses and malware is...
Protecting customers from fake online transactions has always been a challenging task for the company’s security division, which has forced a popular...
An online gaming/gambling site lost $1 million in bitcoin to an attacker who exploited its random number generation (RNG) system. A leading...
The latest spam campaign is equipped with the Dridex banking malware and targeting company accountants through deceptive emails. According to Heimdal Security,...
By the first quarter of 2015, hacker/cyber-attackers have optimized their efforts to design Android Malware to such an extent that every seventeen...
In this era of government surveillance, remaining anonymous has become next to impossible for every Internet user. There is almost nothing we...
Links traced to “Animal Farm” group and State Sponsored cyber criminals who already have targeted Syrian and Iranian computers in 2013. Bratislava,...
Phishing attacks have become a common norm now but lately, a different kind of social engineering hack has been identified, which uses...
Nowadays wearable devices, especially fitness checking devices, are very much in vogue. However, security and technology experts are prompting warnings about the...
The problem with Facebook is thousands of active phishing scams but the social media giant has partnered with popular security software developer firm...