Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
Short Bytes: A developer has released an open-source tool called Disable Windows 10 Tracking to address your Windows 10 privacy concerns. This tool,...
Yahoo ad network has been exploited by a group of hackers that resulted in a serving of malware and ransomware adverts on...
The Sri Lankan prime minister Ranil Wickremesinghe has his office website hacked by a hacktivist who hacks for #ForSyria. A hacker going with...
Short Bytes: Realizing the popularity of Virtual Desktops and needs of a power user, Microsoft has finally integrated this service in Windows...
Donald Trump organization’s official website Trump.com was attacked by hackers yesterday and a message was posted in which Jon Stewart was praised...
It has been a common understanding that Apple devices are well-protected and less vulnerable. It is also believed that Apple computers are...
Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.
Short Bytes : Using some stationary items and glass/plastic sheet, you can make 3D hologram at home. Place a pyramidal frustum over...
A radome at RAF Menwith Hill, a site with satellite uplink capabilities believed to be used by ECHELON (Wikipedia) Short Bytes :...
Short Bytes : Google has written in a new blog post that it won’t be complying with the new French order to...
Short Bytes: A flaw has been reported in thousands of Android apps that will crash them when Android M goes live. The...
It has not been a week, yet hackers have begun to exploit existing Windows users’ computer by sending them a ransomware, via...
We all are aware that Microsoft has recently released the latest version of Windows i.e. Windows 10 which is available as a...
MuhmadEmad, a Kurdish hacker known for his anti-ISIS views is back in news and this time with yet another high-profile hack —...
Short Bytes: Technology pioneer IBM has open sourced 50 tools and apps. These tools cover a large interest area varying from Cloud, Analytics, IoT,...
Short Bytes: I’m writing this article to warn the users who are trying to perform clean install of Windows 10 on their...
Short Bytes: The New York Times has come up with a quiz that will tell you if your personal information has been...
Short Bytes: What if you don’t like Windows 10? There are simple ways to downgrade from Windows 10 to Windows 7 or...
The online hacktivist Anonymous has shut down Taiwan government websites and has termed the act as “just the beginning” of a series...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams