15-day-old campaign has spiked in past 48 hours, with >5,000 new infections daily. Attackers have hijacked thousands of websites running the WordPress...
Antivirus and Security vendor AVG, based in Czech Republic and creator of one of the world’s leading antivirus software collections, is excited...
A new phishing campaign has been doing the rounds on the Internet in which hackers are using Amazon UK’s fake email message...
The Internet and primarily Social Media has catapulted Ahmed Mohammed into an overnight celebrity. Ahmed, a 14-year-old Muslim schoolboy from Texas was...
The social media has lately been criticized greatly for reacting leisurely in eliminating racist images/ comments and xenophobic posts from the site,...
Facebook users with a large number of friends having different characteristics could be at risk of being harmed psychologically, emotionally and even...
A malicious spam campaign that’s been doling out zipped Javascript (.js) files remains an issue, the SANS Internet Storm Center warns. The...
JP Morgan Chase, Credit Suisse, RBS, and Barclays among banks backing effort. The banks of the world are taking a page from...
F-Secure report details “The Dukes” malware family and its Russian connections. For the past seven years, a cyberespionage group operating out of...
SharePoint, one of the tools included with Microsoft Office’s server suite, has been patched to protect users from a persistent XSS (cross-site...
Proof-of-concept exploit installs malicious app on nearby iPhones. Apple has mitigated a critical iOS vulnerability that allows attackers within Bluetooth range of...
The infamous Russian hacker, Vladimir Drinkman, has admitted his contribution in what has been regarded by the Justice Department as “the largest...
Are you also one of those like me who has always believed Facebook needed a Dislike button? If yes, then there is...
Short Bytes: The iOS 9 update is available for download, but lots of Apple users are complaining that before the upgrade even begins...
Short Bytes: Do you have a feeling that NSA and its British counterpart GCHQ spied on you? Well, how to confirm this? Using...
ShortBytes: Linux kernel is one of the most popular and powerful platforms to work upon, but do you know all the facts about...
Short Bytes: PARC has developed a self-destructing computer chip under DARPA’s vanishing programmable resource project. The chip, made of Gorilla glass, will...
Android devices may be protected by a lock screen which requires some form of authentication before access to most phone features, its...
In a Q&A session, CEO Mark Zuckerberg says Facebook will offer more choices than merely “like.” He also discusses virtual reality, artificial...
WordPress core engine security vulnerabilities aren’t rare, but they are uncommon. Most issues affecting the integrity of sites running on the content...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer