Short Bytes: DuckDuckGo CEO Gabriel Weinberg takes a dig at Google in his AMA session saying, “It is a myth you need...
Today the Nobel Peace Prize 2015 will be announced. Will it be a controversial choice? The Nobel Committee will announce the 2015...
Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request. WordPress sites are being abused once again and there...
In the rush for convenience, we have overlooked security when it comes to public Wi-Fi. And, as this feature investigates, there are...
Short Bytes: To keep your WhatsApp data safe and encrypted, WhatsApp has partnered with Google Drive. Take a look to know how to...
A hacker who used the notorious Blackshades RAT malware to hijack webcams on computers, and secretly watch people engaged in sexual activity,...
A vulnerability in Netgear routers, already disclosed by two sets of researchers at different security companies, has been publicly exploited. Netgear, meanwhile,...
Matthew Keys with his attorneys outside Federal Court in Sacramento. He was found guilty in the hacking case against L.A.Times and Tribune...
Short Bytes: A new malicious adware is here to make your lives harder. Kemoge adware has the ability to do some serious damage...
Short Bytes: “Parisa Tabriz-The Security Princess” is Google’s guardian who protects the tech giant from the ‘black hat’ attackers. She is Google’s biggest...
A Leeds-based hacker used a notorious piece of malware called BlackShades to spy on people via their webcams. Investigators from the National...
Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product...
Smartphones of Android users are again under a malware attack, this time with unsolicited unwanted ads. Did you know hackers develop Android malware...
A hacker named Stefan Rigo used intrusive software known as Blackshades to gain access and control over strangers’ webcams. The computers of a couple got hacked by...
The global security company ProofPoint has identified a suspicious malware on its radar capable of stealing money from an ATM faster than...
Months before its technology became the centerpiece of Samsung’s new mobile payment system, LoopPay, a small Massachusetts subsidiary of the South Korean...
Short Bytes: Two-factor authentication is amongst many options, yet one of the most underestimated methods, to improve your online security. If you...
Researchers warn widely used algorithm should be retired sooner. SHA1, one of the Internet’s most crucial cryptographic algorithms, is so weak to...
Transactions were being duplicated in a malleability attack.A Russian man that calls himself “Alister Maclin” has been disrupting the Bitcoin network for...
Image Credit: BusinessInsider Short Bytes: Top tech giant like Google and Microsoft are worth billions and credit their working teams for the...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft