The European Parliament has voted in favour of a resolution that calls on all EU member states to “drop any criminal charges...
A cyber-security industry group has published new research on the CryptoWall ransomware campaign, finding that the attacks have generated more than $300m...
The two platforms drive different devices. But would combining them really be a bad thing? On Thursday, the The Wall Street Journal...
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to...
Calling the formal recognition of the .onion as a Special-use Domain Name by the Internet Engineering Task Force (IETF) “a small and...
A silver Jaguar XFR parked in a parking lot in Auckland, New Zealand was stolen with the help of a hacking device that sends...
WhatsApp, one of the most popular online calling apps, has been exposed by a group of researchers who identified how app’s internal...
Ghosts, monsters and the living dead can all send a chill down one's spine. Ransomware, for some people, is just as spooky....
Short Bytes: Diebold has developed a concept ATM that reduces the use of plastic money for cash withdrawal to zero. The self-serving...
Short Bytes: Attackers are now using an android malware app which camouflages itself as a Microsoft Word document. The malware once triggered, scans...
Short Bytes: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat...
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the...
Authorities in several European countries announced they have coordinated an operation to arrest criminals using the popular DroidJack RAT. Android RATs are becoming...
600k customer identities have been stolen in 2014 and according to government officials thousands of Britons data available for sale in the...
Experts at Symantec have discovered a new variant of the Chikdos DDoS-Trojan that is targeting MySQL servers worldwide. There is a malware...
Thirteen homes in Germany were raided as part of the operation – Image by Thinkstock Police have raided homes in five European countries...
There’s another data breach to report – and it’s a big one, affecting approximately 13 million customers of the “free” web hosting...
Law enforcement agencies across Europe have searched homes this week, as part of an international crackdown against users of a notorious piece...
A security researcher (Troy Hunt), who owns the website (haveibeenpwned) have discovered a possible breach of webhosting service 000Webhost servers. Basically, hunt’s...
Short Bytes: Apple boasts one of the best workforces in the tech world with employees ranging from a software engineer to a...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft