The GreenDispenser malware displays an error on the infected ATMs so that only criminals can use them. Security researchers have discovered a...
Lenovo has been caught, yet again, installing apps on its laptops and workstations without the user’s consent or knowledge, as Michael Horowitz...
Cisco pushed out on Wednesday its usual semiannual round of patches for IOS, the software the company uses for most of its...
TV starlet offers iCloud access, photoshopped nudes, to bait voyeur hackers. The chief hacker behind the infamous iCloud celebrity hacks has revealed...
The IT security researchers at ESET detected malware on popular Android games which created quite a furor among users. A couple of...
Short Bytes: Today, Apple has released a list of the 25 most popular XcodeGhost infected iOS apps. The tech company tells the...
Short Bytes: Google is synonymous with the Internet today, and the word in itself has become a verb. So what made Google...
Apple’s iOS 9 contains a security flaw that lets cybercriminals gain limited access to a device through Siri.
Variant of CryptoLocker makes an unwelcome appearance. Spam emails disguised as messages from local post offices – but actually packing the latest...
A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The...
RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet...
The data breach at the US Office of Personnel Management (OPM) is slowly shaping up to be one of the biggest hacks...
Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in...
A security flaw has been discovered in Apple’s mobile software iOS 9 that lets strangers exploit Siri in order to bypass lock...
In June this year, we reported how Facebook was sued by Belgium’s Privacy Commission (BPC) for tracking users even those who never made...
The experts over at United States Navy are busy in the development of a cyber-protection system, codenamed RHIMES (the Resilient Hull, Mechanical,...
A high schooler from North Carolina and his girlfriend are expecting prosecution both as minor victims and adult culprits for keeping nude...
Short Bytes: In this article, I’m going to share how someone made a “PiPhone”. Well, as the name suggests, PiPhone is a...
Apple’s App Store in China has apparently been penetrated by Hackers which experts say has placed the devices of hundreds of millions...
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files