Crook stole $22 million via online payments company. Gareth David Long, 37, a British man living in Las Vegas, USA, was indicted by...
Researchers earned $2,000 for his discovery. Imgur’s staff have closed a critical security issue that allowed attackers to use its service to send...
BitcoinWisdom Ads Remover extension for Chrome is reportedly stealing bitcoins from users. Bitstamp, a bitcoin exchange portal based in Slovenia, has issued a warning...
Hackers who allegedly infiltrated the Federal Reserve Bangladesh’s account were attempting to steal almost $1 billion, but typos thwarted the plan. This...
Your CCTV camera might make you feel physically safer, but after reading this article, it will sure make you feel virtually vulnerable....
The story behind the Nefertiti Hack just got a lot stranger. But is it a hoax? Last month, two artists grabbed headlines across...
Phishing attacks have linked back to YouTube channels where phishers explain their attacks and promote their tools while looking for buyers. Symantec...
Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be...
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign...
Researcher-devised exploit threatens Bitcoin wallets and other high-value assets. Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic...
Hack the Pentagon – DoD would invite outside hackers to test the cybersecurity of some public US Defense Department resources as part...
Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new...
Incident occurred after employee responded to e-mail phish scam. In a blog post on Sunday, Snapchat executives revealed that the payroll data of...
Apple has patched more than 60 vulnerabilities affecting the Apple TV, including flaws that can lead to arbitrary code execution and information...
Researchers blow the lid on one of the most dangerous and well-organized cyber-espionage groups around. Only after four different cyber-security firms teamed...
Anonymous hacked the CIMD portal managed by the France’s Ministry of Defense to protest against French foreign arms trade operations. The Anonymous...
Some Tor servers may leak timezone info via gzipped files. Jose Carlos Norte, developer for the eyeOS virtual desktop project, has discovered an...
Anonymous launched a series of cyber attacks against government websites of Saudi Arabia to protest the execution of 47 people, including Mr....
Utah state computer systems experiences 300 million hacking attacks a day due to NSA data center in the state. 300,00,000 hacking attempts in...
Phishing scheme gained illegal access to accounts storing 161 nude images. An Oregon man has admitted he tricked hundreds of people into divulging...
Comodo Internet Security, in the default configuration, installs an application called GeekBuddy that also installs a VNC server enabled by default. The hackers...