A new phishing campaign has been doing the rounds on the Internet in which hackers are using Amazon UK’s fake email message...
The Internet and primarily Social Media has catapulted Ahmed Mohammed into an overnight celebrity. Ahmed, a 14-year-old Muslim schoolboy from Texas was...
The social media has lately been criticized greatly for reacting leisurely in eliminating racist images/ comments and xenophobic posts from the site,...
Facebook users with a large number of friends having different characteristics could be at risk of being harmed psychologically, emotionally and even...
A malicious spam campaign that’s been doling out zipped Javascript (.js) files remains an issue, the SANS Internet Storm Center warns. The...
JP Morgan Chase, Credit Suisse, RBS, and Barclays among banks backing effort. The banks of the world are taking a page from...
F-Secure report details “The Dukes” malware family and its Russian connections. For the past seven years, a cyberespionage group operating out of...
SharePoint, one of the tools included with Microsoft Office’s server suite, has been patched to protect users from a persistent XSS (cross-site...
Proof-of-concept exploit installs malicious app on nearby iPhones. Apple has mitigated a critical iOS vulnerability that allows attackers within Bluetooth range of...
The infamous Russian hacker, Vladimir Drinkman, has admitted his contribution in what has been regarded by the Justice Department as “the largest...
Are you also one of those like me who has always believed Facebook needed a Dislike button? If yes, then there is...
Short Bytes: The iOS 9 update is available for download, but lots of Apple users are complaining that before the upgrade even begins...
Short Bytes: Do you have a feeling that NSA and its British counterpart GCHQ spied on you? Well, how to confirm this? Using...
ShortBytes: Linux kernel is one of the most popular and powerful platforms to work upon, but do you know all the facts about...
Short Bytes: PARC has developed a self-destructing computer chip under DARPA’s vanishing programmable resource project. The chip, made of Gorilla glass, will...
Android devices may be protected by a lock screen which requires some form of authentication before access to most phone features, its...
In a Q&A session, CEO Mark Zuckerberg says Facebook will offer more choices than merely “like.” He also discusses virtual reality, artificial...
WordPress core engine security vulnerabilities aren’t rare, but they are uncommon. Most issues affecting the integrity of sites running on the content...
More than a dozen routers in four countries infected with fully featured implants. Researchers have uncovered active and highly clandestine attacks that...
As researchers expected it would, CoreBot, the credential-stealing malware that surfaced last month, has added a bevy of new capabilities and reinvented...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment