Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts...
Short Bytes: Ghost Squad Hackers group has taken down multiple .gov websites in Ethiopia. The collective has blamed the government for killing...
The terrorists first murdered the female journalist Ruqia Hassan and then hacked her Facebook account to spy on her contacts. The terrorist from...
A security flaw in Blackphone 1 smartphone allowed anyone to take control of the device Blackphone 1 smartphones, one of many privacy-focused...
Short Bytes: Technologies like IOT, 3D printing, VR camera and Tesla skimmed through entire 2015. But which technology in 2016 is going...
FBI has taken down a site involved in Child pornography through some hacking techniques that have never been used in the history...
Microsoft has released stats regarding Windows 10 usage worldwide which proves the point that user privacy is a very real concern Although,...
Short Bytes: In this article, I bring to you a new project called Javascript Tips that promises to deliver you one Javascript tip per...
It has been almost half a year since Microsoft released Windows 10, and the decision whether or not to migrate computers to...
A number of weeks back, security researcher Parvez Anwar posted a number of DLL hijacking vulnerabilities within Microsoft Office on Twitter [1]....
As ever, ESET is once again in attendance at CES in Las Vegas, offering you expert insight into all the security aspects...
IOActive’s Fernando Arnaboldi has sounded the alarm on three major flaws in Drupal’s update process that may allow attackers to poison Drupal...
Encrypting all HTTP traffic has long been considered a key security goal, but there have been two key obstacles to this. First,...
Short Bytes: From an IP address associated with 32nd Chaos Communication Congress (32c3) taking place in Germany, some unknown hackers sent a...
The security-focused smartphone contained vulnerabilities which allow hackers to control the device’s modem and call functions. Researchers have revealed a severe vulnerability in...
Malware was infecting machines, adding them to its botnet.Similar-looking malware targeting both Linux and Windows computers has been linked to a DDoSing...
Short Bytes: Being Anonymous online is the need of the hour, and TOR browser does that job quite efficiently and honestly. But...
Exploit Flash Heap Isolation for a chance to “win” $100,000 If you can exploit Adobe’s Heap Isolation mitigation in Flash player version...
Google had to intervene to fix a few vulnerabilities that risked exposing its Nexus devices and related Android operating system to remote...
Anonymous Responds to Thai Police’s Flawed Murder Investigation by Hacking 14 Thai Websites The hackers at Anonymous are yet again busy in...