For the past week, unknown groups of cyber-criminals have taken control of and wiped data from CouchDB and Hadoop databases, in some...
An unknown third-party has leaked the source code of the old Opera Presto browser engine on GitHub, and later on Bitbucket, two...
Data traders are allegedly swapping the details of over one million user accounts belonging to Supercell, the company behind hit mobile games...
Zachary Shames pleaded guilty today to charges of developing and selling malware that was later used to infect thousands of victims. Before...
General Motors already notifying employees about the breach. Detroit’s Big Three automakers are the latest big companies to become victims of hackers,...
Security researchers have gained access to one of the servers used by the Cerber gang, from where they were able to extract...
If flashing a peace sign is your go-to selfie move, you might want to think about coming up with a new signature...
Attackers could gain full control over passenger bookings, cancel flights, and steal sensitive information with leaked booking codes. While waiting for my...
Facebook users in France are subject to a wave of malicious ads, which if clicked, will redirect them to a website hosting...
The ShadowBrokers is the hacker crew stolen the arsenal of the NSA-Linked Equation Group is offering for sale the stolen NSA Windows...
Mystery malware begins targeting a key disk-wiping defense. There’s a new variant of the Shamoon disk-wiping malware that was originally unleashed on...
The Los Angeles Community College District has paid a US$28,000 ransomware after crooks compromised its network. Fortunately, the school retrieved data. A...
Recent variants of the “Merry Christmas” ransomware, also known as Merry X-Mas, are also dropping the DiamondFox malware on infected computers, which...
I’ve just about recovered from the sensory overload that is CES to gather my thoughts from what was another fascinating event. This...
Executives still looking into the deal, it seems. Verizon is once again unsure whether to complete the takeover of Yahoo or not,...
Browser autofill profiles are a reliable phishing vector that allow attackers to collect information from users via hidden fields, which the browser...
SGX needs I/O protection, Austrian boffins reckon. Intel’s Software Guard Extensions started rolling in Skylake processors in October 2015, but it’s got...
A hacker going by the online handle of “Kuroi’SH” hacked and defaced the official Google Brazil domain earlier Tuesday afternoon. The hacker...
Looks like the NSA has a history of positively identifying Russian hacks. The FBI, CIA and President Barack Obama all agree that...
An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing their content, and asking for a Bitcoin ransom...
US issued JAR billed itself as an indictment that would prove Russian involvement. Talk about disappointments. The US government’s much-anticipated analysis of...