We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up...
Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second...
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some...
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have...
Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security...
A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.
In April, ESET’s Laboratory in Latin America received a report on an executable program named "Liberty2-0.exe." Now, it asks is there a...
Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.
Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player...
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their...
This real-time global cyber attack map is trending in the social media since couple of days. Colorful lasers depict the attacks that...
The LG Update Center Application faces yet another threat of cyber attack as was discovered by SEARCH-LAB Ltd in November 2014. A...
The Malaysian Police Facebook and Twitter added to the list of targeted government social media accounts — Monday afternoon saw the pages...
Virtual Machines are software that are used to run other operating systems within a pre-installed operating system. This self-contained OS runs as...
Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick...
To benefit the hard-working app developers and programmers, Amazon is starting a cloud-based service named AWS Device Farm. AWS Device Farm will...
Today, Facebook is one of the biggest company to work for. The name itself creates an aura around you (if you are...
The website of Indian Space Agency ISRO’s commercial wing Antrix Corporation was hacked on Sunday. This attack comes two days after ISRO...
Do you love playing games on your Android tablet and smartphone? Well, the innocent games you play, could be a route to...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw