International law enforcement agencies have arrested more than 60 people suspected of carrying out cybercrime associated with the Darkode forum.
Artificial Intelligence is getting embedded in our lives on a regular basis in form of various speech recognition software, digital assistants like...
Today, the common public is aware, more than ever, regarding rights and privacy. Recent revelations made by whistleblowers like Edward Snowden and...
We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up...
Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second...
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some...
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have...
Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security...
A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.
In April, ESET’s Laboratory in Latin America received a report on an executable program named "Liberty2-0.exe." Now, it asks is there a...
Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.
Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player...
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their...
This real-time global cyber attack map is trending in the social media since couple of days. Colorful lasers depict the attacks that...
The LG Update Center Application faces yet another threat of cyber attack as was discovered by SEARCH-LAB Ltd in November 2014. A...
The Malaysian Police Facebook and Twitter added to the list of targeted government social media accounts — Monday afternoon saw the pages...
Virtual Machines are software that are used to run other operating systems within a pre-installed operating system. This self-contained OS runs as...
Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick...
To benefit the hard-working app developers and programmers, Amazon is starting a cloud-based service named AWS Device Farm. AWS Device Farm will...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft