Short Bytes: Baidu, the Chinese analogous to Google has distributed a software development kit (SDK), Moplus, which has reportedly made over 100...
Short Bytes: Are you new to the world of Git and GitHub, finding it a little bit scary? Well, to erase these...
Wallets are becoming more integrated with other things. Soon, we might all use our phones as a way to pay for things....
Vodafone is the second British telecommunications company in two weeks to be on the receiving end of a serious hack. Yet another...
A group of hackers who claimed responsibility for the hacking of numerous government and even Chinese websites since 2012 has found a...
Earlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars...
Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was...
Short Bytes: Zerodium’s million dollar iOS 9 jailbreak bounty program has expired and it has resulted in a new iOS jailbreak. But,...
Short Bytes: Linus Torvalds says, “Talk is cheap. Show me the code.” What if you show him some code and it pisses...
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of...
Short Bytes: Adobe Flash Player continues to remain the favorite target of the cyber attackers. The recent zero-day exploits that were earlier...
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify...
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting...
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two...
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details....
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the...
Tor team is one step closer to launch the Tor messenger as they have finally launched the first beta version after three...
PayPal has been one of the most attractive platforms for the hackers and spammers. During a recent year, PayPal users have been...
GOKANO is a new service that offers you gadgets, electronics, free t-shirts and many more things. Now winning is just like a...
The Tor Project has officially launched the first beta version of Tor Messenger, an open source and Encrypted instant messaging client that...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft