A new phishing campaign has been doing the rounds on the Internet in which hackers are using Amazon UK’s fake email message...
The Internet and primarily Social Media has catapulted Ahmed Mohammed into an overnight celebrity. Ahmed, a 14-year-old Muslim schoolboy from Texas was...
The social media has lately been criticized greatly for reacting leisurely in eliminating racist images/ comments and xenophobic posts from the site,...
Facebook users with a large number of friends having different characteristics could be at risk of being harmed psychologically, emotionally and even...
A malicious spam campaign that’s been doling out zipped Javascript (.js) files remains an issue, the SANS Internet Storm Center warns. The...
JP Morgan Chase, Credit Suisse, RBS, and Barclays among banks backing effort. The banks of the world are taking a page from...
F-Secure report details “The Dukes” malware family and its Russian connections. For the past seven years, a cyberespionage group operating out of...
SharePoint, one of the tools included with Microsoft Office’s server suite, has been patched to protect users from a persistent XSS (cross-site...
Proof-of-concept exploit installs malicious app on nearby iPhones. Apple has mitigated a critical iOS vulnerability that allows attackers within Bluetooth range of...
The infamous Russian hacker, Vladimir Drinkman, has admitted his contribution in what has been regarded by the Justice Department as “the largest...
Are you also one of those like me who has always believed Facebook needed a Dislike button? If yes, then there is...
Short Bytes: The iOS 9 update is available for download, but lots of Apple users are complaining that before the upgrade even begins...
Short Bytes: Do you have a feeling that NSA and its British counterpart GCHQ spied on you? Well, how to confirm this? Using...
ShortBytes: Linux kernel is one of the most popular and powerful platforms to work upon, but do you know all the facts about...
Short Bytes: PARC has developed a self-destructing computer chip under DARPA’s vanishing programmable resource project. The chip, made of Gorilla glass, will...
Android devices may be protected by a lock screen which requires some form of authentication before access to most phone features, its...
In a Q&A session, CEO Mark Zuckerberg says Facebook will offer more choices than merely “like.” He also discusses virtual reality, artificial...
WordPress core engine security vulnerabilities aren’t rare, but they are uncommon. Most issues affecting the integrity of sites running on the content...
More than a dozen routers in four countries infected with fully featured implants. Researchers have uncovered active and highly clandestine attacks that...
As researchers expected it would, CoreBot, the credential-stealing malware that surfaced last month, has added a bevy of new capabilities and reinvented...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft