Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors...
Experian, a major credit reference agency has suffered a huge data breach. Around 15 million T-Mobile users (who signed up for T-Mobile’s...
On Tuesday, Facebook announced that tests are being conducted which will allow users to change their static profile pic to a 7-sec video clip. Facebook is now...
Short Bytes: T-Mobile CEO John Legere has confirmed that its 15 million users’ database has been hacked as its credit vendor Experian...
Short Bytes: Linux.Wifatch not only prevents further attacks from router malware, it also shows a message telling the people to change passwords and...
Since the official public launch of Microsoft’s new operating system Windows 10 and the announcement of the company’s revised all-in-one privacy policy,...
SCHAUMBURG, Ill. — Credit-reporting agency Experian said on Thursday that hackers accessed the Social Security numbers, birthdates and other personal information belonging...
Short Bytes: Hackers have released potentially damaging 15GB worth of private data after attacking Patreon, a crowdfunding website for artists. On an...
Apple just released iOS 9.0.2. This new version claims to close the well-publicised Lock screen hole that lets anyone view and edit...
Ex-Googler Sanmay Ved was lucky enough to grab Google.com domain, but only for a minute. google.com purchase screen In a detailed post...
The moment your phone reads “No service,” Google Maps suddenly drops out.That is, unless you’ve saved your maps for offline access. With...
Short Bytes: The recently discovered Breaking Bad ransomware remains undetected by the majority of the 57 security products listed on Google’s VirusTotal antivirus...
When researcher Joshua Drake published details in August about critical Android vulnerabilities in the Stagefright media playback engine, he promised there would...
the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and...
Hackers with links to Russia tried to infiltrate Hillary Rodham Clinton’s home e-mail server at least five times — even as other...
Dark-web deadbeats may not be as anonymous as they think. A bloke in the US was charged on Friday after FBI spyware...
Short Bytes: Microsoft has launched a free course to teach you how to code Windows 10 Universal Apps using C#. Take a...
Cyber-crime syndicate tried to intimidate antivirus vendor. In some cases, cyber-security work can turn really dangerous, and even deadly, if you manage to...
Short Bytes: New Tesla Model X has a bio-weapon defense air mode that will give you a hospital level air quality inside...
Gatekeeper is Mac OS X’s guardian against rogue applications and malware sneaking into Apple’s famous walled garden. It’s also been a favorite...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft