Short Bytes: The humble wireless router in your home, as you might not think, could be the biggest loophole in your personal...
Last week, news spread across the web (appearing in newsfeeds of many users) that Facebook is about to assign a fee for...
Short Bytes: The latest WinRAR SFX v5.21 update has a serious vulnerability that allows remote attackers to execute any malicious code on your...
Vulnerability allowed hackers to hijack active user sessions.Microsoft Exchange Server has been recently patched to fix an important security vulnerability which would...
Threat actors are using a previously discovered distributed denial-of-service (DDoS) attack tool dubbed XOR DDoS to launch upwards of 20 DoS attacks...
Short Bytes: As more and more Linux systems are going online, the threat to the once-secure Linux systems is increasing. In a...
The NSA whistleblower Edward Snowden has finally joined Twitter and within a few hours he has earned a verified badge along with...
SAP patched a dozen holes in its in-memory management system, HANA, that could have led to SQL injection attacks, cross-site scripting (XSS)...
A survey has found that most parents in the UK are keen to see a minimum age introduced for smartphone ownership.
Saudi Arabia’s Government’s decision to crucify Mohammed al-Nimr has prompted a strong response from the Hacktivist group Anonymous when various significant Saudi government websites were hacked...
Short Bytes: To address your privacy concerns, Silent Circle has tried to create the super-secure Android phone and its newest model Blackphone...
WinRAR, the popular file compression and decompression utility, has a security vulnerability that allows attackers to remotely execute code on the user’s...
Kovter Trojan can hide in Windows registry and does not need to be stored on the computer’s hard drive- claims Symantec —...
The Dyreza Trojan long ago ceased its exclusive focus on stealing banking credentials, and has been blamed for its part in attacks...
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you...
Short Bytes: Do you know about the Darknet and TOR? Here’s an interesting piece of information if you are interested in the...
Short Bytes: In the second article of Getting Started With Raspberry Pi series on fossBytes, I’ll be telling you about all the...
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released...
Short Bytes: Finally, Microsoft takes some time to address the widespread Windows 10 privacy concerns. In a blog post on Windows.com, a...
VBA stands for Visual Basic for Applications and is a programming language developed by Microsoft to help programmers create Windows applications using...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024