TV starlet offers iCloud access, photoshopped nudes, to bait voyeur hackers. The chief hacker behind the infamous iCloud celebrity hacks has revealed...
The IT security researchers at ESET detected malware on popular Android games which created quite a furor among users. A couple of...
Short Bytes: Today, Apple has released a list of the 25 most popular XcodeGhost infected iOS apps. The tech company tells the...
Short Bytes: Google is synonymous with the Internet today, and the word in itself has become a verb. So what made Google...
Apple’s iOS 9 contains a security flaw that lets cybercriminals gain limited access to a device through Siri.
Variant of CryptoLocker makes an unwelcome appearance. Spam emails disguised as messages from local post offices – but actually packing the latest...
A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The...
RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet...
The data breach at the US Office of Personnel Management (OPM) is slowly shaping up to be one of the biggest hacks...
Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in...
A security flaw has been discovered in Apple’s mobile software iOS 9 that lets strangers exploit Siri in order to bypass lock...
In June this year, we reported how Facebook was sued by Belgium’s Privacy Commission (BPC) for tracking users even those who never made...
The experts over at United States Navy are busy in the development of a cyber-protection system, codenamed RHIMES (the Resilient Hull, Mechanical,...
A high schooler from North Carolina and his girlfriend are expecting prosecution both as minor victims and adult culprits for keeping nude...
Short Bytes: In this article, I’m going to share how someone made a “PiPhone”. Well, as the name suggests, PiPhone is a...
Apple’s App Store in China has apparently been penetrated by Hackers which experts say has placed the devices of hundreds of millions...
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Short Bytes: What if you had to study one single page to get the complete idea of a programming language? In this...
Security researchers at VerSprite have tested and discovered a few vulnerabilities in Western Digital’s My Cloud NAS (Network Attached Storage) hard drive,...
A new piece of adware that serves as an entry point for future trojan infections was discovered by Dr.Web security researchers. This...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams