Skype users have been advised by Microsoft to change their passwords following reports that 'spoofed' messages are being sent without user permission.
How cool would it be if somehow your parents were Pitt’s and ended up to name you Brad, or a simple Messi...
The 37 million users of hacked infidelity site Ashley Madison are at risk of having their names and private details leaked, reports...
Windows 10 is one of most talked about topics on various online forums. Microsoft is leaving no stone unturned to achieve its...
Online cheating website AshleyMadison.com has been hacked, and as a result, large chunks of data has been stolen. The compromised data has...
“How Government secretly read your e-mails with this insane law?“ “Snowden’s Revelations: XKEYSCORE is NSA’s search engine.” “Real-Time Cyber Attacks across the globe. ““NSA’s...
This is the 3rd post in the series covering top open source projects by most popular companies in the world. Today, we...
Pakistani President Mamnoon Hussain’s website has been hacked by Bangladeshi hackers — 72 other Pakistani government websites have been hacked as well....
Millions of Windows XP users are now left vulnerable to malware attacks as Microsoft has decided to terminate support and security updates...
The world is getting scarier each day. And I don’t mean the terrorist attacks or cyber threats or global warming, or least...
With Windows 10’s Windows Hello feature, you will be able to log into your PCs without any password. Windows Hello users to...
Microsoft Azure cloud platform is very popular among Linux users and now Microsoft has announced that it will be offering limited support...
iCloud Drive is one of the most-used Apple services as it’s a Dropbox-like solution to keep all your devices’ data in sync....
A Morrisons employee with a grudge was responsible for posting personal data of nearly 100,000 staff onto the internet, a court heard.
Earlier this month, as a part of the massive breach at the infamous Hacking Team, numerous documents were leaked. Since then, analysts...
About two weeks ago, we reported about the Raspberry Pi 2 based WiFi router that provided anonymous WiFi by putting you 2.5...
British teen Seth Nolan Mcdonagh, aka "narko" has been sentenced for his role in a 2013 attack which slowed the internet around...
United Airlines has paid out two million flight miles to two security researchers who uncovered 14 separate vulnerabilities in the company’s operation.
Welcome to the second post of the series covering top open source projects by most popular companies in the world. Last time,...
The American security Agency NSA is infamous for its mass surveillance programs. Every alternate day, we are greeted with new revelations regarding...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft