Last New Years Eve, a hacking group “Lizard Squad” spoiled the party for gamers with a DDoS attack on the Play Station...
Hiroyuki Inoue, associate professor at Hiroshima City University’s Graduate School of Information Sciences in Japan showed how an app and a custom...
When it comes to protecting your children online, knowledge of risks is vital. With this in mind, ESET asked Australian parents about...
Image | Flickr Short Bytes: Pressing the backspace key repeatedly 28 times can allow you to exploit a bug in the Grub2 bootloader....
Trio of threats assaults unsuspecting Comcast Xfinity users. Some users visiting the Comcast Xfinity portal faced a triple threat these past days, being...
Today, Rapid7 is disclosing several vulnerabilities affecting several Network Management System (NMS) products. These issues were discovered by Deral Heiland of Rapid7...
TeslaCrypt ransomware infections continue to surge. We reported last week about the first signs of a new TeslasCrypt ransomware campaign that was slowly...
A court in Brazil has ordered the mobile phone operators on Wednesday to block the WhatsApp messaging application throughout the country for...
ShortRead: Why the loss of identity online can lead to severe consequences, no matter how solid and reliable your preventive measures...
There are a hundred types of malware hidden inside the Bible and Quran apps, most of which are available all over the...
Image: fossBytes Short Bytes: A Tails live-USB is like a security-focused computer in a tiny box. Edward Snowden used the same OS...
ShortRead: A group of researchers have developed a system which can hack and steal data from any smartphone user. Today, one of...
Short Bytes: In a recent interview with the VICE, Peter Sunde, co-founder, and ex-spokesperson for The Pirate Bay expressed his thoughts and...
Short Bytes: A new study has surfaced which claims the yearly earnings to the pirates to be around $70 million/year. Digital Citizens...
Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive...
Image | AngularJS Blog Short Bytes: Google has released the beta version of its AngularJS 2 framework. The 2.x branch of the...
ESET has recently observed a huge increase in detections of the Nemucod trojan, a threat that usually tries to download another malware...
FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security...
Researcher also launches a DoS attack on the car’s computer. A professor at Hiroshima City University was able to hack an Internet-connected car...
The Tokyo Metropolitan Police Department has taken maintaining law and order to another level: it uses a massive drone to catch other...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment