Jonathan Petit, security researcher at Security Innovation, Inc., has revealed he can easily fool the LiDAR sensors on any self-driving car to...
Sounds like it’s going to be a busy few days for R&D and PR departments at least two security companies. This weekend,...
A man credited with helping to create the infamous Gozi banking malware has pled guilty in a US court. Deniss Calovskis, 30,...
Heimdal Security researchers have observed a new ransomware campaign that utilizes the Neutrino exploit kit to deliver Teslacrypt ransomware to victims via...
For those who were complaining about the size of iPhone 5, this guy from the Fresno State owes his life to iPhone 5....
Mozilla yesterday detailed a security attack on its bug tracker and testing tool Bugzilla, as well as the steps it is taking to mitigate...
Short Bytes: Using the Internet of Things we will control our future lives by inculcating electronics and internet in each and every small...
Last week, a YouTube user posted a video on his profile in which he recorded a test flight of his homemade personal...
Short Bytes: Ubuntu powered phones are gaining popularity each day and we are here with a tweak to run Ubuntu Phone in windowed...
Short Bytes: Hooks is an award winning alert and notification app available for Android and iOS which can send you a notification for anything...
A genius teenager was planning to throw a party (maybe at his home), but it is usually hard to convince your parents...
Short Bytes: Facebook with its multi-billion user base, is the biggest social media giant today. But there are some things you might not...
UNSW staff had to scramble to contain an embarrassing outbreak of undergraduate humour, after the university’s Facebook page was hacked on its annual...
Short Bytes: After being criticized due to the introduction of Windows 10-like spying features in Windows 7 and 8.1, Microsoft has tried...
We’re used to seeing malware that exploits unpatched vulnerabilities in software. But in a new twist attackers are bundling an old version...
While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation...
Security experts constantly tell users not to reuse passwords on multiple accounts, but the message often falls on deaf ears. Now, officials at...
Endangering Humanity: Spammers steep to the lowest level of cruelty — Exploiting the shocking pictures of drowned Syrian boy is plain Inhuman....
Over the last few weeks we’ve seen an increase in fake vouchers being spread via WhatsApp. This scam has all the hallmarks...
G DATA security experts published their latest research in which they’ve analyzed top Chinese Android smartphone models and found that a large...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment