Artificial Intelligence is getting embedded in our lives on a regular basis in form of various speech recognition software, digital assistants like...
Today, the common public is aware, more than ever, regarding rights and privacy. Recent revelations made by whistleblowers like Edward Snowden and...
We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up...
Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second...
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some...
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have...
Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security...
A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.
In April, ESET’s Laboratory in Latin America received a report on an executable program named "Liberty2-0.exe." Now, it asks is there a...
Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.
Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player...
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their...
This real-time global cyber attack map is trending in the social media since couple of days. Colorful lasers depict the attacks that...
The LG Update Center Application faces yet another threat of cyber attack as was discovered by SEARCH-LAB Ltd in November 2014. A...
The Malaysian Police Facebook and Twitter added to the list of targeted government social media accounts — Monday afternoon saw the pages...
Virtual Machines are software that are used to run other operating systems within a pre-installed operating system. This self-contained OS runs as...
Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick...
To benefit the hard-working app developers and programmers, Amazon is starting a cloud-based service named AWS Device Farm. AWS Device Farm will...
Today, Facebook is one of the biggest company to work for. The name itself creates an aura around you (if you are...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024