The director of one of Europe’s top aviation agencies warned on Thursday that hackers could infiltrate critical systems in an airplane on...
A Saudi woman created a furor by scandalizing her cheating husband by posting a video of him kissing their maid on social...
Short Bytes: DuckDuckGo CEO Gabriel Weinberg takes a dig at Google in his AMA session saying, “It is a myth you need...
Today the Nobel Peace Prize 2015 will be announced. Will it be a controversial choice? The Nobel Committee will announce the 2015...
Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request. WordPress sites are being abused once again and there...
In the rush for convenience, we have overlooked security when it comes to public Wi-Fi. And, as this feature investigates, there are...
Short Bytes: To keep your WhatsApp data safe and encrypted, WhatsApp has partnered with Google Drive. Take a look to know how to...
A hacker who used the notorious Blackshades RAT malware to hijack webcams on computers, and secretly watch people engaged in sexual activity,...
A vulnerability in Netgear routers, already disclosed by two sets of researchers at different security companies, has been publicly exploited. Netgear, meanwhile,...
Matthew Keys with his attorneys outside Federal Court in Sacramento. He was found guilty in the hacking case against L.A.Times and Tribune...
Short Bytes: A new malicious adware is here to make your lives harder. Kemoge adware has the ability to do some serious damage...
Short Bytes: “Parisa Tabriz-The Security Princess” is Google’s guardian who protects the tech giant from the ‘black hat’ attackers. She is Google’s biggest...
A Leeds-based hacker used a notorious piece of malware called BlackShades to spy on people via their webcams. Investigators from the National...
Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product...
Smartphones of Android users are again under a malware attack, this time with unsolicited unwanted ads. Did you know hackers develop Android malware...
A hacker named Stefan Rigo used intrusive software known as Blackshades to gain access and control over strangers’ webcams. The computers of a couple got hacked by...
The global security company ProofPoint has identified a suspicious malware on its radar capable of stealing money from an ATM faster than...
Months before its technology became the centerpiece of Samsung’s new mobile payment system, LoopPay, a small Massachusetts subsidiary of the South Korean...
Short Bytes: Two-factor authentication is amongst many options, yet one of the most underestimated methods, to improve your online security. If you...
Researchers warn widely used algorithm should be retired sooner. SHA1, one of the Internet’s most crucial cryptographic algorithms, is so weak to...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer