Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick...
To benefit the hard-working app developers and programmers, Amazon is starting a cloud-based service named AWS Device Farm. AWS Device Farm will...
Today, Facebook is one of the biggest company to work for. The name itself creates an aura around you (if you are...
The website of Indian Space Agency ISRO’s commercial wing Antrix Corporation was hacked on Sunday. This attack comes two days after ISRO...
Do you love playing games on your Android tablet and smartphone? Well, the innocent games you play, could be a route to...
In the wake of cyber crimes, a DDoS (Distributed Denial of Service) attack is something to be on the look-out for. Lately,...
From instant messaging to apps like WhatsApp and SnapChat, there are plenty of possibilities to chat on the Web, and many social...
You know it’s easy to download and delete your searches from Google Search, but did you know you can also delete or manage...
There is no dearth of instant messaging applications these days and people are addicted to Facebook Messenger, WhatsApp, SnapChat, IM on Twitter,...
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some...
Almost everyone uses the Internet now a days. Some people use mobiles and tablets where we all have to pay data usage...
This weekend, Bryce Casavant who is a Canadian conservation officer was suspended from duty when he denied the orders to kill two...
Ever wondered about the number of users an Android-based malware app can infect after getting approved and published on the Google Play...
This is the first article of the series where we will be publishing about top open source projects made by big blue...
Taking Advantage of Hacking Team Leak, Hackers Target Users with Adobe Phishing Email. As you know Adobe flash is a software used...
The Pirate Bay is one of the most popular torrenting sites of the world, and it has constantly been into the limelight...
Last week we reported hackers are developing Android malware every 17 seconds, making it one of the most vulnerable OS ever. Now...
A Yemeni hacker going with the handle of “Lov3rDns” has hacked and defaced the official social network domain of U.S president Barack...
31-year old Lucas Chansler is set to serve 105 years, perhaps the remaining days of his life, in prison after admitting to...
Get ready to bid farewell to your favourite messaging apps. These could be the last days for Britons to use the immensely...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan