Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans...
Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming...
600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the...
Experts at Symantec have discovered a new variant of the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware...
Thirteen homes in Germany were raided as part of the operation – Image by Thinkstock Police have raided homes in five European countries...
There’s another data breach to report – and it’s a big one, affecting approximately 13 million customers of the “free” web hosting...
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece...
A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s...
Short Bytes: Apple boasts one of the best workforces in the tech world with employees ranging from a software engineer to a...
A group of researchers have demonstrated how locations of Facebook and WhatsApp users can be exposed by a security flaw in 4G networks....
An 11-year-old girl from New York has set up her own business selling cryptographically secure passwords, using a technique known as diceware.
Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to...
Short Bytes: Our innocent habit of copy-paste is reflected when we send the URLs of search pages as some reference to our...
ESET researchers receive and analyze thousands of new malware samples every day. Earlier this year, one of them caught our attention because...
Google began to implement SSL on its search engine back in 2010. First on its own domain name, then as a...
A challenge has been made against one of the conclusions in a potentially blockbuster academic paper on cryptographic weaknesses that may be...
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars. This unidentified thief did not have the...
The online hacktivist Anonymous is planning to leak personal information of around 1000 members of the white supremacist Christian organization the Ku Klux Klan...