Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the...
Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers $1 million for finding vulnerabilities and...
Govt mulls a policy that requires users to save messages, and hand them over to law enforcement agencies, if asked. Deleting WhatsApp...
Adobe has released a Flash Player update that addresses 23 critical vulnerabilities in the software, many which can lead to code execution....
Cryptowall attackers are smashing businesses in the Australian state of Queensland, according to the owner of a Townsville sex shop which has...
The Ghost Push malware comes with those Android apps that are available at non-Google app stores. The newly discovered Android malware dubbed as Ghost Push Malware has...
New Android malware was discovered, able to steal money from online banking accounts, and hide SMS notifications coming to confirm financial transactions....
Short Bytes: It’s reported that scammers are taking advantage of Facebook Dislike button anticipation and they’re using the Facebook users. These scams trick...
After two weeks of sharp, last minute changes in the Bitcoin price, the markets caught a break this week, with the price...
Short Bytes: The government of India doesn’t understand the concept of online privacy and the importance of encryption. A new government body...
Apple has removed more than 300 malicious apps after confirming the first major breach to its iOS app store.
Just a few minutes ago, September 20, Animesoft International had the great pleasure of informing Softpedia about the immediate availability for download...
At the Air Force Association Air & Space conference in National Harbor, Maryland (near Washington), Major General Burke Wilson revealed a new...
Hackers can’t easily get malware directly in iOS apps so they’re taking a different approach: Modifying the programming environment that Apple provides...
Anonymous Philippines, an affiliate of the online hacktivist group Anonymous, hacked and defaced the official website of the country’s National Telecommunications Commission (NTC) Sunday...
New Dislike button scam has started to make rounds on the Facebook, one of the most popular and widely used social media...
Short Bytes: Linux containers (LXC) are very popular these days among developers and companies (perhaps due to Docker, which leverages LXC on the...
Security experts have warned ATM (Automated Teller Machine) users to stay clear from suspicious ATMs for past several years because of numerous...
Short Bytes: Linus Torvalds is the creator of Linux and he still decides what will happen in the world of Linux. Read...
The online hacktivists affiliated to Anonymous, AntiSec and HagashTeam conducted a cyber attack on Vietnamese government websites against online censorship and human...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024