A recent experiment by a researcher would force you to reconsider the safety of your important data and make you put a...
Short Bytes: Colby Moore, a researcher from cyber security firm Synack, has taught the attendees of Black Hat Conf. something that can...
It infuses the predefined date and time to the objective programming in this way preventing it from expiry. Demo variant programming basically...
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining...
The extremist militant organization the so-called Islamic State (IS, previously ISIS/ISIL) often uses the recruitment tactic of catfishing, which means hiring Western females specifically...
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
Short Bytes: This week, Google is releasing the “single largest software update the world has ever seen”. It has started rolling out patches for...
Short Bytes: A team of security researchers have successfully demonstrated that the standard equipment inside computers, printers and other devices could be hacked...
A new research conducted by a group of researchers demonstrates how your smartphone and laptop battery can be used to invade your...
The U.S. Department of Health and Human Services reports that earlier this year the records of 3.9 to 4 million people nationwide...
Short Bytes: With Windows 10, there comes a pre-installed app called Windows 10 Phone Companion app. This app helps you to sync...
Short Bytes: Canonical has released a list of Ubuntu desktop certified hardware to tell you the best laptop to install Linux. Even if...
As we are approaching the much-awaited hacking conferences DefCon and Black Hat, security researchers and engineers are revealing their studies and exploits...
Dubizzle, the popular Middle Eastern online classifieds for bargain hunters, sellers and job seekers has had its UAE servers compromised – albeit...
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
Short Bytes: A developer has released an open-source tool called Disable Windows 10 Tracking to address your Windows 10 privacy concerns. This tool,...
Yahoo ad network has been exploited by a group of hackers that resulted in a serving of malware and ransomware adverts on...
The Sri Lankan prime minister Ranil Wickremesinghe has his office website hacked by a hacktivist who hacks for #ForSyria. A hacker going with...
Short Bytes: Realizing the popularity of Virtual Desktops and needs of a power user, Microsoft has finally integrated this service in Windows...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft