List of Top tricks and hacks of 2015 #1 Use WhatsApp Without Your Mobile Number If you don’t want to use your...
The social network’s face-recognition software has been sued again and to add salt to their wounds, privacy groups also have issued warnings....
Be on the lookout for copycat social media accounts which may be attempting to lead your customers astray.
The recent hack of fembot dating extramarital affairs website Ashley Madison, which resulted in data from millions of accounts being dumped online, has one more salutary...
Jonathan Petit, security researcher at Security Innovation, Inc., has revealed he can easily fool the LiDAR sensors on any self-driving car to...
Sounds like it’s going to be a busy few days for R&D and PR departments at least two security companies. This weekend,...
A man credited with helping to create the infamous Gozi banking malware has pled guilty in a US court. Deniss Calovskis, 30,...
Heimdal Security researchers have observed a new ransomware campaign that utilizes the Neutrino exploit kit to deliver Teslacrypt ransomware to victims via...
For those who were complaining about the size of iPhone 5, this guy from the Fresno State owes his life to iPhone 5....
Mozilla yesterday detailed a security attack on its bug tracker and testing tool Bugzilla, as well as the steps it is taking to mitigate...
Short Bytes: Using the Internet of Things we will control our future lives by inculcating electronics and internet in each and every small...
Last week, a YouTube user posted a video on his profile in which he recorded a test flight of his homemade personal...
Short Bytes: Ubuntu powered phones are gaining popularity each day and we are here with a tweak to run Ubuntu Phone in windowed...
Short Bytes: Hooks is an award winning alert and notification app available for Android and iOS which can send you a notification for anything...
A genius teenager was planning to throw a party (maybe at his home), but it is usually hard to convince your parents...
Short Bytes: Facebook with its multi-billion user base, is the biggest social media giant today. But there are some things you might not...
UNSW staff had to scramble to contain an embarrassing outbreak of undergraduate humour, after the university’s Facebook page was hacked on its annual...
Short Bytes: After being criticized due to the introduction of Windows 10-like spying features in Windows 7 and 8.1, Microsoft has tried...
We’re used to seeing malware that exploits unpatched vulnerabilities in software. But in a new twist attackers are bundling an old version...
While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams