Code reviewers looking over a mail daemon have turned up a couple of reasonably serious bugs in the Libre SSL code base...
The number of countries deploying it grows to 32.FinFisher, a piece of spyware sold to governments by a German security vendor, has...
Two security firms (FireEye and Mandiant), have found a group of hackers (Fin5) who specialize in credit card stealing and have till date stolen...
An alert from Carnegie Mellon University CERT database reveals how Android devices are affected by LTE security flaw and use for DDoS...
Over the past few months, TrueCaller has helped us in tracing the mobile number well ahead in advance, before picking up the phone....
If you prevent access to your computer with just a password, you are missing out on an alternate (and more secure) way...
Powerup and French drone-maker firm Parrot collaborated together to create a revolutionary new gadget that easily converts something as insignificant like a...
Microsoft’s Windows 10 is known for collecting personal data of its users, but who thought the firm will be forcefully displaying ads...
A Kosovan man named Ardit Ferizi has been arrested in Malaysia for suspected hacking of US military databases comprising of personal information of...
Dow Jones Hacked by Russians for Obtaining Trading Tips — No one knows how much money the made. A group of Russian...
Industry looking to improve access controls and authentication, but decisions still governed by security requirements, use cases, hacker disruption. Yahoo this week...
A group of Russian hackers infiltrated the servers of Dow Jones & Co., owner of the Wall Street Journal and several other...
Developers have been quick to fix the problem. An important security issue on Ubuntu phone that has been revealed this morning has been...
TeslaCrypt doesn’t mean anything to many PC users, but there are thousands of people who have somehow contracted this infectious malware program that...
Short Bytes: The FCC is on the receiving end over its proposed rules to alter WiFi routers to make them secure as...
Facebook is a great platform for those who are looking for new friends, finding old ones or to promote their business. In...
UltraDNS, a web content delivery service, went down Thursday afternoon, taking with it a number of popular websites, including Netflix and Expedia....
Short Bytes: In 2015, the infamous spyware FinFisher is spread in 32 countries to perform advanced citizen surveillance. Citizen Lab, a security watchdog,...
HTTP Strict Transport Security (HSTS) was designed to help secure websites (those using HTTPS) by declaring to web browsers that they should...
Short Byte: In a bizarre incident, Facebook users are reportedly seeing increasing friend suggestions of the people they have dated before through...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft