It’s 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any...
Wohooo! Great news for hackers and penetration testers. Offensive Security has just released Kali Linux 2019.1, the first 2019 version of its...
It’s not at all surprising that downloading movies and software from the torrent network could infect your computer with malware, but it’s...
How do you check if a website asking for your credentials is fake or legit to log in? By checking if the...
A hacker who was selling details of nearly 620 million online accounts stolen from 16 popular websites has now put up a...
The United States Department of Justice has announced espionage charges against a former US Air Force intelligence officer with the highest level...
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing...
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors...
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious...
What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are...
Welcome back! Adobe has today released its monthly security updates to address a total of 75 security vulnerabilities across its various products,...
A new security vulnerability has been discovered in the latest version of Apple’s macOS Mojave that could allow a malicious application to...
Microsoft has issued its second Patch Tuesday for this year to address a total of 77 CVE-listed security vulnerabilities in its Windows...
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day,...
A malicious Windows EXE file can even infect your Mac computer as well. Yes, you heard me right — a .exe malware...
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin...
Apple has finally released iOS 12.1.4 software update to patch the terrible Group FaceTime privacy bug that could have allowed an Apple...
Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that...
The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that...
For all of the undeniable conveniences the Internet has brought us, it’s becoming an increasingly dangerous place to be. Both individual hackers...
Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the...