Short Bytes: Baidu, the Chinese analogous to Google has distributed a software development kit (SDK), Moplus, which has reportedly made over 100...
Short Bytes: Are you new to the world of Git and GitHub, finding it a little bit scary? Well, to erase these...
Wallets are becoming more integrated with other things. Soon, we might all use our phones as a way to pay for things....
Vodafone is the second British telecommunications company in two weeks to be on the receiving end of a serious hack. Yet another...
A group of hackers who claimed responsibility for the hacking of numerous government and even Chinese websites since 2012 has found a...
Earlier this month, exploit acquisition platform Zerodium debuted an iOS 9 bug bounty that would pay out up to three million dollars...
Researchers have discovered an Android malware disguising itself as a Microsoft word document which triggers a malicious code once opened. This Android malware was...
Short Bytes: Zerodium’s million dollar iOS 9 jailbreak bounty program has expired and it has resulted in a new iOS jailbreak. But,...
Short Bytes: Linus Torvalds says, “Talk is cheap. Show me the code.” What if you show him some code and it pisses...
Facebook’s is always changing and its team is adding new functionality every couple of months. With new changes there are chances of...
Short Bytes: Adobe Flash Player continues to remain the favorite target of the cyber attackers. The recent zero-day exploits that were earlier...
Timing attacks are an interesting part of computer security. As an extreme example, imagine that your computer took one second to verify...
Snapchat’s new term and conditions have resulted in outrage from its users and twitter has been flooded with tweets from users rejecting...
A laptop filled with data? An external HDD filled with even more data? There’s bound to be a phone – possibly two...
In the wake of the TalkTalk Scandal, Vodafone finally admitted that hackers did manage to steal around 20,000 Vodafone customers’ bank details....
My last on-topic post pontificated about the dangers and surprise of letting third parties into your house or codebase, where I discussed the...
Tor team is one step closer to launch the Tor messenger as they have finally launched the first beta version after three...
PayPal has been one of the most attractive platforms for the hackers and spammers. During a recent year, PayPal users have been...
GOKANO is a new service that offers you gadgets, electronics, free t-shirts and many more things. Now winning is just like a...
The Tor Project has officially launched the first beta version of Tor Messenger, an open source and Encrypted instant messaging client that...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment