Intel acknowledges that Skylake processors freeze in the middle of work. A bug has been found in the Intel processors that can freeze...
Security experts at Heimdal Security are warning a spike in cyber attacks leveraging the popular Neutrino and RIG exploit kit. Cyber criminals...
A critical bug on eBay’s website opened the door for malicious hackers to create fake login pages to steal passwords and harvest...
A new type of RAT (Remote Access Trojan) has been discovered in use against governments and civil society organizations in South-East Asia,...
CBS endangered cyber-procedural: Plane hacking! Software defined radio! White noise! OMG!. There are lots of cringeworthy technology moments on television, especially when the...
Wearable devices can be used as motion-based keyloggers. French student and software engineer, Tony Beltramelli, has published his master thesis called Deep-Spying: Spying...
Short Bytes: A young Turkish hacker namedOnur Kopçak was sentenced to 334 years in prison. The cyber criminal was convicted for credit...
The final instalment in Cameron Camp's security-focused coverage of CES 2016, looks at the future of drones. It's all about augmented reality.
API used a simple authentication scheme, exposing users to CSRF attacks that allowed third-parties to hijack accounts. Verizon fixed an issue in...
Robert Lipovsky, a senior malware researcher at ESET, offers his expert insight into the recent discovery of BlackEnergy malware in Ukrainian energy...
Netflix Hack : Here Is How To Open Up Movie Portals You Didn’t Know Existed. You probably know that Netflix is a online...
Short Bytes: fossBytes brings you a list of 10 best free antivirus software of 2016 for different kinds of platforms such as best antivirus...
Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line...
The hacking group New World Hacking that claimed the responsibility for the BBC attack revealed that the DDoS attack reached the 602...
Ian Trump of LOGICnow wonders whether the humble PING could be our savior This Government of Canada press release caught my eye...
Image | Kingston Short Bytes: Kingston Digital, one of the world leaders in memory products, has released DataTraveler 2000 encrypted USB Flash...
Privacy protection or criminal activity prevention? UK Government faces battle against tech companies on a hot matter UK Government drafted a plan...
Random Hardware Address Prevents Windows 10 Mobile Phone’s location from being tracked — Here’s how to do it Tracking users’ location through...
Appalled by Corruption, Theft & Poverty- Anonymous Declares Cyberwar against Nigerian Government Anonymous, the infamous hacktivist group having footprints around the world,...
Brain Test malware is back. Its developers compromised 13 apps on the Google Play Store, Lookout cyber security firm discovered last December....
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft