Another blow to the law enforcement agencies – researcher from leading security group hacks his way out of ankle bracelet without raising...
Short Bytes: Two former employees of the security firm Kaspersky labs have told Reuters that the Russian company made fake malware for...
Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a...
Web crawler is a program that browses the Internet (World Wide Web) in a predetermined, configurable and automated manner and performs given...
A drone is known for killing people or for its surveillance capabilities, but an aerial assault drone with hacking capabilities? Yes, you read that...
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to...
Aran Khanna, a Harvard student, was deprived of a chance to intern at Facebook after he exposed a critical privacy related flaw...
Short Bytes: Microsoft has some options in Windows 10 to enable the privacy protection, but according to some latest research done by...
Short Bytes: Every popular online service exposes a status page to show the status of various service they offer to end user...
Short Bytes: Mozilla has released Firefox 40 for Windows 10 and it comes with changes in user interface trying to blend with...
Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from...
A group of ISIS Affiliated Hackers has claimed to have hacked U.S. government servers stealing the personal data of hundreds of Government...
Short Bytes: Web crawler is a program that browses the Internet (World Wide Web) in a predetermined, configurable and automated manner and performs...
A video demonstration by the University of California researchers how a simple text message can control your car. The months of July and August have...
Short Bytes: With Windows 10, Microsoft has also overhauled the Windows Update process. You might already be knowing their no way of pausing...
The first ever security flaw in Windows 10 is here — A team of security researchers have found a vulnerability in the...
Earlier we reported how hackers are using Remote Access Trojan (RAT) to get into your computer and record your online activity including your webcam...
Short Bytes: In the world of cyber threats and privacy breaches, here’s a list of 10 websites and services you should know to...
Not every hack will work under every circumstance, so choosing the right strategy is more likely to lead to success and less...
If you’ve ever wondered how software pirates can take software and crack it time and time again, even with security in place,...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams