Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the...
Do you know that you can access your WeChat, Line and WhatsApp chats on your desktop as well using an entirely different,...
Short Bytes: Peter Sunde, co-founder of The Pirate Bay, talked about the decentralization of the torrent ecosystem on TorrentFreak’s audio podcast series...
The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices....
Attackers can collect your HTTPS Web traffic history. Alex Chapman and Paul Stone from Context, a UK cyber security consultancy firm, have discovered...
When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the Chimera...
The official forum for the popular mobile game Clash of Kings is the latest to fall victim to a cyberattack after a...
The Indian security expert and bug hunter Avinash has accessed and downloaded the entire Vine source code and it was really easy....
Softpedia spoke with Rebirth, co-founder of BinarySec. The Anonymous #OpISIS campaign seemed at one point to have slowly died out after the Charlie...
The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it...
Device was specifically designed for journalists. Infamous NSA whistleblower Edward Snowden and hardware hacker Andrew ‘bunnie’ Huang have presented today at MIT’s Media...
Short Bytes: The founder of the world’s largest torrent hosting website KickassTorrents is now behind the bars. The cause of his arrest...
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that...
Library of Congress and Copyright Office also affected. The US Congress has just recovered after a three-day-long DDoS attack that has crippled its...
Company promises to refund affected users. Steemit, a relatively small social network, announced last Thursday, on July 14, that an unknown attacker had...
Nothing is safe nowadays, not even 3D printers. A hacker could breach a company’s network, hack into a 3D printer, and alter small...
Some of the data looks legit, some looked fake. A group of hackers who call themselves “Pravyy Sector” [Right Sector] are extorting...
ATM transactions suspended in Taiwan for two days. Taiwan’s top eight banks have suspended operations on 900 ATMs after crooks stole NT$70 million...
Freely available tool follows the release of more than 642 million account credentials. Over the past few months, a cluster of megabreaches...
Tor has been the go-to for anonymous communication online for years now — and that has made it one of the juiciest...
Hacktivists from Ghost Squad Hacker group made revealed the identities of hackers affiliated with the ISIS cyber army called United Cyber Caliphate....