It seems that the EU citizens might have to give up their Facebook accounts if they want to protect their online privacy....
After the release of Ubuntu MATE 15.04 Beta 2, Ubuntu 15.04 Final Beta, Ubuntu Kylin 15.04 Beta 2 and Kubuntu 15.04 Beta 2,...
The voting system used by the Eurovision Song Contest was briefly forced offline after a suspected cyberattack caused an "extreme" surge in...
On March 21st, a group of pro-ISIS hackers from Morocco, going with the handle of Team System DZ hacked into the server...
Remember that time while installing an app, you agreeing to all the terms and conditions without giving much thought. Well, here is...
ESET's Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety.
Point of Sale credit card terminals are under threat from a new malware named PoSeidon, thought to be more dangerous than the...
Exceeding your data limit could be your biggest nightmare if you don’t have an unlimited data connection. Listening your prayers, Google has...
A hacker has discovered that the openness of Tinder's API allowed him to set up unknowing men via a fake female profile...
Privacy advocates are not happy with new Hello Barbie toy for kids – Researchers claim the Barbie with ability to have conversation with kids...
A new study reveals our own smartphones are constantly tracking our movements after every 3 minutes – Our apps love to know...
Not even a month has passed since AllCrypt Bitcoin was taken down and another Altcoin exchange has been attacked by hackers. Cryptoine...
Facebook evidently hasn’t fully accepted the failure of Home and is now trying to swap your Android smartphone’s dialer with one of...
The Irish government's Freedom of Information (FOI) website has been targeted by hackers claiming to be connected to the ISIS terror group.
The House of Representatives Intelligence Committee has introduced a new threat sharing bill designed to let businesses share details of security treats...
The security researchers at Ben Gurion University in Israel have identified the method of obtaining air-gapped system data through heat emissions and the built-in...
Prison Security Breached by Drone to Transfer Knife, drugs and phones into the jail. This can easily pass as a very daring...
Beware all you retailers, a new Trojan program dubbed as PoSeidon targets point-of-sale or PoS terminals and can potentially steal payment card...
Canada has been using an array of cyberweapons to gather intelligence, spy on other governments and damage adversary infrastructure, says a new...
Nearly 40 percent of large companies - including a significant number in the Fortune 500 - are not taking necessary precautions to...