Short Bytes: DuckDuckGo CEO Gabriel Weinberg takes a dig at Google in his AMA session saying, “It is a myth you need...
Today the Nobel Peace Prize 2015 will be announced. Will it be a controversial choice? The Nobel Committee will announce the 2015...
Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request. WordPress sites are being abused once again and there...
In the rush for convenience, we have overlooked security when it comes to public Wi-Fi. And, as this feature investigates, there are...
Short Bytes: To keep your WhatsApp data safe and encrypted, WhatsApp has partnered with Google Drive. Take a look to know how to...
A hacker who used the notorious Blackshades RAT malware to hijack webcams on computers, and secretly watch people engaged in sexual activity,...
A vulnerability in Netgear routers, already disclosed by two sets of researchers at different security companies, has been publicly exploited. Netgear, meanwhile,...
Matthew Keys with his attorneys outside Federal Court in Sacramento. He was found guilty in the hacking case against L.A.Times and Tribune...
Short Bytes: A new malicious adware is here to make your lives harder. Kemoge adware has the ability to do some serious damage...
Short Bytes: “Parisa Tabriz-The Security Princess” is Google’s guardian who protects the tech giant from the ‘black hat’ attackers. She is Google’s biggest...
A Leeds-based hacker used a notorious piece of malware called BlackShades to spy on people via their webcams. Investigators from the National...
Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product...
Smartphones of Android users are again under a malware attack, this time with unsolicited unwanted ads. Did you know hackers develop Android malware...
A hacker named Stefan Rigo used intrusive software known as Blackshades to gain access and control over strangers’ webcams. The computers of a couple got hacked by...
The global security company ProofPoint has identified a suspicious malware on its radar capable of stealing money from an ATM faster than...
Months before its technology became the centerpiece of Samsung’s new mobile payment system, LoopPay, a small Massachusetts subsidiary of the South Korean...
Short Bytes: Two-factor authentication is amongst many options, yet one of the most underestimated methods, to improve your online security. If you...
Researchers warn widely used algorithm should be retired sooner. SHA1, one of the Internet’s most crucial cryptographic algorithms, is so weak to...
Transactions were being duplicated in a malleability attack.A Russian man that calls himself “Alister Maclin” has been disrupting the Bitcoin network for...
Image Credit: BusinessInsider Short Bytes: Top tech giant like Google and Microsoft are worth billions and credit their working teams for the...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment