Microsoft will charge you $119 from 29th July 2016 in order to update your operating system from Windows 7 and Win 8...
Pakistani Intelligence Agency ISI is using Smartphone Malware for Spying upon its Military and Security Forces- Claims Indian Government. Pakistan’s intelligence agency...
A few months ago, we reported on a white hack against Dridex where the malicious payload was removed and an Avira antivirus...
AS FAR AS made-up holidays go, “World Password Day” doesn’t quite have the same cachet as, say, Father’s Day, or even National...
Remember when a 100 gigabyte hard drive was huge? I try not to think about it, but I also remember when no...
Most of the viruses modify the attributes of a file or a folder such that they become very hard to access. Some...
Short Bytes: Unity 8 with Mir and Snaps are the future of Ubuntu Desktop after Ubuntu 16.04 Xenial Xerus, according to Canonical’s Will...
Today, we’ve been alerted about an ongoing spam campaign against Skype users. The majority of those affected are in India, Japan, and...
Short Bytes: There are some very certain prime numbers that are illegal. Yes, having them in your possession or sharing them with...
Fix still isn’t available for most users, and many will probably never get it.For the past five years, a vulnerability in many...
Security agencies can spy on you through your laptop and smartphone cameras — It’s time to cover them. With new and modern...
After George W. Bush and Colin Powell, Guccifer admits Hacking Private Email Server of Hillary Clinton and it was very easy. Marcel...
Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google...
Short Bytes: Google products represent an individual brand in themselves. Over the years, Google products like Google Drive, Google Maps, YouTube, Google’s...
Massive Data Breach Hits Russian Users of Gmail, Yahoo and Hotmail — Russian Hacker Steals 250 million Email Addresses and Passwords and...
iPhone users in the United Kingdom have been targeted with yet another phishing scam designed to steal their iCloud accounts — The...
Forget about passwords – it's all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and...
Today, we have encountered a new threat that’s a blast from the past. The Petya Trojan (detected by Kaspersky Lab products as...
Short Bytes: Deciding a security-focused password is tougher that one might think. Even the most security-conscious users commit the mistake of forming...
We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage