The brand new Torrents-Time browser plugin has helped The Pirate Bay take the industry of online video portal by storm as it...
Pro-rape and controversy child Roosh blames Hacktivists for hacking his family’s address and spreading hoax news The controversial ‘neo-masculinist” Roosh has claimed...
Short Bytes: Do you remember computer viruses from 1990’s that left you with no option but to reinstall your operating system? Well,...
Spam campaign targets Portuguese-speaking firms in Brazil and other regions to deliver malware and steal sensitive data. Symantec has observed an ongoing...
THREE AND A half years after he sought temporary asylum in the Ecuadorean embassy in London only to find himself a captive...
Here are 7 activities that users should avoid doing on the Internet The Internet is a wonderland. It is a place where...
Experts at the SANS Technology Institute spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers. Johannes Ullrich, security...
Relive simpler times for some Friday fun. The Internet Archive has opened a new collection dubbed the Malware Museum that lets you run...
Another antivirus maker decides to mess around with Chromium default security features and gets it totally wrong. Just two days after Comodo’s...
Twitter announced that since mid-2015 it has suspended over 125,000 accounts involved in promoting violent content. The social media giant Twitter has claimed...
Bad news for those website owners who trick their readers/users into clicking on fake ads and tricky downloads — Google Chrome is...
The TPP deal is coming and things won’t be easy on the Internet The Trans-Pacific Partnership trade deal was signed by New...
Another day another data breach but this one has affected even those students who were part of the university in the 1980s....
According to the NSW Government Department of Resources and Energy Chinese hackers have launched a malware-based attack on its network in December....
Part of the distribution channel of the Dridex banking Trojan botnet may have been hacked, with malicious links replaced by installers for...
A security researcher has released the exploit code for two serious vulnerabilities in the Netgear ProSAFE NMS300 network management system. Do you have...
Short Bytes: The security firm Avecto has just released its security report on Windows operating system. The report outlines an important result...
The reuse of login details on Alibaba’s Taobao has allowed an attack on 5 percent of the accounts on Alibaba’s Chinese retail...
Dell and Cylance join the fight against bootkits. Dell has announced a partnership with Cylance, which will add a new security layer for...
NASA has denied that its drone was hijacked by any hacking group — Earlier a group on Facebook claimed to have hijacked...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage