Short Bytes: Colby Moore, a researcher from cyber security firm Synack, has taught the attendees of Black Hat Conf. something that can...
It infuses the predefined date and time to the objective programming in this way preventing it from expiry. Demo variant programming basically...
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining...
The extremist militant organization the so-called Islamic State (IS, previously ISIS/ISIL) often uses the recruitment tactic of catfishing, which means hiring Western females specifically...
Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.
Short Bytes: This week, Google is releasing the “single largest software update the world has ever seen”. It has started rolling out patches for...
Short Bytes: A team of security researchers have successfully demonstrated that the standard equipment inside computers, printers and other devices could be hacked...
A new research conducted by a group of researchers demonstrates how your smartphone and laptop battery can be used to invade your...
The U.S. Department of Health and Human Services reports that earlier this year the records of 3.9 to 4 million people nationwide...
Short Bytes: With Windows 10, there comes a pre-installed app called Windows 10 Phone Companion app. This app helps you to sync...
Short Bytes: Canonical has released a list of Ubuntu desktop certified hardware to tell you the best laptop to install Linux. Even if...
As we are approaching the much-awaited hacking conferences DefCon and Black Hat, security researchers and engineers are revealing their studies and exploits...
Dubizzle, the popular Middle Eastern online classifieds for bargain hunters, sellers and job seekers has had its UAE servers compromised – albeit...
Hackers are using a commercially available VPN network in China to obscure the origin source of their activities.
Senior research fellow Righard J. Zwienenberg on why the Internet of Things could be *the* key security issue for the foreseeable future.
Short Bytes: A developer has released an open-source tool called Disable Windows 10 Tracking to address your Windows 10 privacy concerns. This tool,...
Yahoo ad network has been exploited by a group of hackers that resulted in a serving of malware and ransomware adverts on...
The Sri Lankan prime minister Ranil Wickremesinghe has his office website hacked by a hacktivist who hacks for #ForSyria. A hacker going with...
Short Bytes: Realizing the popularity of Virtual Desktops and needs of a power user, Microsoft has finally integrated this service in Windows...
Donald Trump organization’s official website Trump.com was attacked by hackers yesterday and a message was posted in which Jon Stewart was praised...
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
(Cyber) Risk = Probability of Occurrence x Damage
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
VMware Patches Severe Security Flaws in Workstation and Fusion Products
New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation