When Anonymous goes against you, there’s no way out! Same is going on with Canadian government who’s constantly under cyber attack against...
The problem with Facebook is thousands of active phishing scams but the social media giant has partnered with popular security software developer firm...
In 2013, we came up with a tutorial on How to undo sent emails on gmail. Now a new email tool has...
U.S Defense Department, as well as its security agencies, have always wanted UK style hoverbikes that although perform all the functions that...
Recent high-profile data breaches have illustrated criminals’ insatiable appetite for data and financial reward. Here's some information on what to do after...
Apple will reportedly introduce a new privacy update for the iPhone that will prevent installed iOS apps from seeing which other apps...
When someone talks about stealing some data from a PC, what is the suspected source according to you? You may end up...
Recently, a researcher revealed that Google might be spying on all of its Chromium web browser users by stealth downloading audio listeners...
Another day, another Facebook phishing scam — The email claims to be sent by Facebook Team and warns recipients that they have...
For people who have been hit by the menace of revenge porn, a recent announcement by Google will bring some relief. Google...
Kali Linux is a penetration testing and security auditing Linux distribution. After its release in March 2013, Kali Linux has quickly become...
You are using your laptop and it has a software updater tool – what do you expect it to do? You expect...
A MacRumors Forum user has stumbled upon the fact that when installing the iOS 9 (beta version), the operating system will delete...
Europol is going after people using social media platforms to spread ISIS propaganda. It was the Anonymous hacktivist group who took the...
A new photo-sharing application has been released by Facebook this week called Moments. This app utilizes facial recognition technology to tag and...
The online hacktivist Anonymous hacked and defaced the the official website of Montreal Police Union (Fraternité des policiers et policières de Montréal)...
An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a...
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help...
According to the latest documents revealed by NSA whistleblower Edward Snowden, the National Security Agency (NSA) and its British counterpart, Government Communications...
I’m fan of Facebook’s facial recognition technology and how efficiently is tags you automatically in pictures. Facebook is constantly improving its technology...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw