Short Bytes: VoCore is an open hardware that runs OpenWRT Linux. This tiny computer comes with Wi-Fi, USB, 20+ GPIOs that will...
Gumtree is a free classified advertising site and subsidiary of eBay particular popular in the UK, Australia, and South Africa. Gumtree is the number one local...
Short Bytes: A ransomware was found on the official website of EC-Council that runs Certified Ethical hacker program. After EC-Council did not...
Nothing is safe these days, not even Node’s npm.The Node.js Package Manager (or just npm) allows the author of a malicious package...
Security researchers from the Cheetah Mobile Security Research Lab discovered a severe flaw in the call management application Truecaller. Recently, security researchers...
Apple Watch saved the life of a 62-year-old man in Canada who was suffering heart attack — Thanks to Apple Watch’s Health and...
Brazil now has its own Wikileaks and they call it BrasiLeaks A group of Brazilian activists and privacy advocates have joined hands...
Short Bytes: Google Chrome is recognized as one of the best web browsers out there. Its simplicity and speed speak volumes for...
SMS Spoofing occurs when a sender manipulates address information. Often it is done in order to impersonate a user that has roamed...
Short Bytes: 2016 is going to see a flush of the Android phones and choosing the best Android phone among all will...
Ransomware is a type of malware that forces its victims to pay the ransom through certain online payment methods in order to...
Demolition Company sabotages Wrong House, Employee Faults Google Maps A Texas-based demolition firm Billy “L Nabors Demolition” mistakenly damaged the wrong duplex...
San Francisco’s Verizon Enterprise solution’s computer security wing suffered an abrupt massive hack of 1.5 million customers’ records. Brian Krebs who is...
A recent survey suggests the social media giant Facebook will be the biggest virtual graveyard by the end of this century By...
It’s not a joke, the product is expected to be launched this year In today’s world smartphones can do almost anything, but...
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its...
The IDs and passwords of about 18 million Internet users have been found on a computer server set up by a Tokyo...
The Carbon Black Threat Research Team has recently discovered a new family of ransomware, which they dubbed “PowerWare,” that targets organizations via...
Researchers at Fox-IT warn that the website of security certification provider EC Council has been compromised to host the malicious Angler Exploit...
A US based company is working on guns that look like smartphones — They may be easy to carry but they may...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft