Short Bytes: Internet of Things are constantly being targeted by attackers to get the better off of the companies or individuals. CCTV...
Sony has agreed to pay up to $8m over employees’ personal data lost in the 2014 hacking scandal surrounding the release of...
Short Bytes: A hacker that operates a Twitter handle named Amped Attacks, is taking down the websites spreading homophobia and racism one...
Sharon Goldberg remembers the cold February day when her Boston University PhD candidate Aanchal Malhotra was studying routing security, in particular, attacks...
Apple has released security updates to fix critical vulnerabilities in the following Apple products: OS X El Capitan, Mavericks and Yosemite, OS...
All users of the Linux 4.2 kernel must upgrade It looks like it’s still October 22 in some countries, so Greg Kroah-Hartman...
The CIA boss John Brennan had his AOL-based email account hacked earlier this week by pro-Palestinian hackers — Now WikiLeaks has leaked some...
Exploits can be used to snoop on encrypted traffic and cause debilitating outages. New attacks on Network Time Protocol can defeat HTTPS...
My new Xiaomi Mi 4c smartphone arrived yesterday after an interlude with a German customs agent and several days of delay. I...
Oracle on Tuesday patched 154 vulnerabilities in 54 different products as part of its regularly scheduled Critical Patch Update. More than half...
Jailbreak team PanguTeam was credited with finding two security flaws. Apple fixes 49 security bugs in iOS 9.1; kills jailbreak Apple has...
WIKILEAKS MAY DESCRIBE itself as an outlet for whistleblowers, but it’s never hesitated to publish stolen documents offered up by a helpful...
The CIA and the FBI are always looking for backdoors in Apple devices, in fact, the agency spent years trying to hack iPhone...
Short Bytes: A security researchers from the Pen Testers Partners has revealed that the smart iKettles in your homes are very “insecure.”...
Free service backed by EFF is now trusted by all major browsers. A nonprofit effort aimed at encrypting the entire Web has...
Short Bytes: An incident of hacking into the school computer systems and changing the subject grades has been spotted in a New...
To avoid viral stains, go jogging alone or with Bluetooth binned. A vulnerability in FitBit fitness trackers first reported to the vendor...
Swindlers impersonate Apple service that remotely accesses user desktops. For years, scammers claiming that they’re “calling from Windows” have dialed up Microsoft...
Some consumer-grade, self-encrypting external hard drives are littered with security vulnerabilities that render their encryption an afterthought. An academic paper published in...
How many of you have watched the sci-fi film’s sequel “Back to the Future II”? Do you know the time machine on...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams