Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to...
Aran Khanna, a Harvard student, was deprived of a chance to intern at Facebook after he exposed a critical privacy related flaw...
Short Bytes: Microsoft has some options in Windows 10 to enable the privacy protection, but according to some latest research done by...
Short Bytes: Every popular online service exposes a status page to show the status of various service they offer to end user...
Short Bytes: Mozilla has released Firefox 40 for Windows 10 and it comes with changes in user interface trying to blend with...
Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from...
A group of ISIS Affiliated Hackers has claimed to have hacked U.S. government servers stealing the personal data of hundreds of Government...
Short Bytes: Web crawler is a program that browses the Internet (World Wide Web) in a predetermined, configurable and automated manner and performs...
A video demonstration by the University of California researchers how a simple text message can control your car. The months of July and August have...
Short Bytes: With Windows 10, Microsoft has also overhauled the Windows Update process. You might already be knowing their no way of pausing...
The first ever security flaw in Windows 10 is here — A team of security researchers have found a vulnerability in the...
Earlier we reported how hackers are using Remote Access Trojan (RAT) to get into your computer and record your online activity including your webcam...
Short Bytes: In the world of cyber threats and privacy breaches, here’s a list of 10 websites and services you should know to...
Not every hack will work under every circumstance, so choosing the right strategy is more likely to lead to success and less...
If you’ve ever wondered how software pirates can take software and crack it time and time again, even with security in place,...
Short Bytes: Kali Linux 2.0 has been released with tons of new features and it’s now based on Debian Jessie. It comes...
An unusual admission has been made by a tech firm to its investors — Posing as its employee, a hacker stole $46.7...
A security flaw in the Facebook API allows hackers to decrypt and scan IDs, which left 1.44 billion Facebook users identities at...
If your bored of using Windows phone then you can try this tutorial. In this article we will teach you “How To...
In 2013, we at HackRead reported how oil and gas sector faces serious physical and online security threats. Now researchers have found...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment