Recently we reported that some security researchers managed to hack into the Jeep’s onboard entertainment system to remotely take over the vehicle’s...
Short Bytes: Traffic fingerprinting is a technique used to sniff the web traffic by analyzing the data packets’ flow pattern- without removing...
United Airlines customer flight records have been lost in a data breach it has been reported.
From cars to trains from computers to planes, anything connected with the Internet is vulnerable to cyber attacks. It is believed that a...
Images: Wired Short Bytes : Security researchers have found a way to hack the Tracking Point sniper rifles. These “smart” snipers run...
Short Bytes : The recent Fiat Chrysler car hack exposed the vulnerabilities and the extent to which insecure IoT can be dangerous....
If you have got the latest Windows 10 upgrade, you will notice about 15-20GB space missing from your disk drive. These files...
Short Bytes: After rolling out the Windows 10 upgrade, Microsoft has released Windows 10 ISO files. If you don’t want to go...
On July 25, 2015, we reported how a group of Morrocan hackers hacked and defaced the official domains of Google, Microsoft and...
Short Bytes : The developer team behind Linux-based Solus distro has achieved a remarkable feat as they brought down the boot time...
Short Bytes : Your smartphone is at the equal risk of getting infected by malware as is your computer. Hers’s a list...
Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy...
Short Bytes: Microsoft has released Windows 10 ISO files for performing a clean install on your PCs after the Windows 10 upgrade....
Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users' details were published online.
The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not...
Short Bytes: Microsoft has released its best OS ever and it looks like “back to the future” of Windows. Realizing the mistake...
(Credit: Reuters/Bobby Yip) Short Bytes : The White House has rejected a petition with more than 167,000 signatures to pardon whistleblower Edward...
The servers of Planned Parenthood, the non-profit reproductive health care organization, has recently been hacked by anti-abortionist hacker group. While the compromised...
Are you an Android phone user? Please pay attention as now it only takes one text message to hack an Android phone....
Security experts and non security experts take very different attitudes to staying safe online, according to new research.
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment