Apple iOS mobile operating system’s Message App bug causes its devices iPad, iPhone and Apple Watch to crash and/or reboot. Apple announced...
The IRS announced in an official statement today that it has closed down an online service to obtain tax records after sensing...
Summary: An official statement issued by an FBI agent reveals that InfoSec researcher Chris Roberts has confessed to hacking into the controls of...
Please note that the email that appears to be sent by USPS informing that due to incorrect address the firm has failed...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
If you are a hacker or an IT security researcher, United Airlines has announced its first ever Bug Bounty program for you...
Summary: In a bid to raise awareness regarding the way malware can affect GPUs, a team of developers recently created a Linux...
Summary: Earlier this week Bob Sullivan reported that hackers can easily access Starbucks customer accounts by stealing their username and passwords and naturally Starbucks...
The CrowStrike researchers discovered that any attacker can burst out of specific virtual machines and exploit whatever is running nearby — The...
A Florida based woman thwarted a dangerous hostage situation by using the delivery instructions section of an online pizza ordering service by...
Can you believe there are several online forums who actually claim to provide hackers in case you want to get someone’s Website, Facebook,...
AlphaCrypt Crypto-Malware the actual mind blower is that it Looks like TeslaCrypt and acts like CryptoWall. the latest piece of ransomware with...
The malicious email, targeted at a company’s resume screening department, is equipped with file encryption capabilities. A new ransomware having capabilities of...
The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals...
A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and...
The web is an interconnected maze consisting of people, organization and computers. The easiest way to hack into such a system is...
A warning has been issued by the FAA regarding the software glitch in the system of Boeing’s 787 Dreamliner — This glitch...
Delivering banking malware through Microsoft Word documents has been a less common method. However, it is currently being used for spreading malicious...
Expect exposure of confidential news pieces and government/corporate classified documents every now and then because WikiLeaks, the anti-secrecy group has re-launched its...
Google has recently unveiled a new Chrome extension called Password Alert, designed as a defense tool for phishing threats by issuing an...