Image: shutterstock Today is the world where people worry less about getting mugged on street and more on the internet. With the cyber...
An online gaming/gambling site lost $1 million in bitcoin to an attacker who exploited its random number generation (RNG) system. A leading...
The latest spam campaign is equipped with the Dridex banking malware and targeting company accountants through deceptive emails. According to Heimdal Security,...
Studies show women are more vulnerable to phishing scams than men and same has happened with Vivian Gabb who told media how she...
Back in the month of January, one of the most popular bitcoin exchange namely BitStamp was hacked which resulted in the stealing...
A 20-year-old Brazilian kid has been revealed as the maker of more than 100 banking trojans by the security firm Trend Micro....
We all know NSA is powerful. Getting into your email accounts and accessing all the private information that include your pictures, voice...
WikiLeaks founder Julian Assange has revealed many controversial documents in the past couple of weeks related to Germany and France. Recently he...
By the first quarter of 2015, hacker/cyber-attackers have optimized their efforts to design Android Malware to such an extent that every seventeen...
Plex Media Sever forum’s registered users received an email from the firm announcing that a breach of their system has exposed private...
Mark Zuckerberg vows to make Internet and Facebook available in remote communities through LASERS — Facebook Laser Beam is coming. Mark Zuckerberg, Facebook’s...
Web search has become synonymous with Google search. Other search engines like Bing and Yahoo are trying their best to give a...
In this era of government surveillance, remaining anonymous has become next to impossible for every Internet user. There is almost nothing we...
A new app could see Mastercard accepting selfies instead of passwords to make purchases online.
While you share an incredibly happy moment or a deep thought on social media or change to a new dashing profile picture,...
Not so long ago, Canadian servers were working under peace, but after the approval of controversial anti-terror bill C-51, there’s no peace...
Remember those rumors about Anonymous hacktivists creating their own social media? Well, they aren’t! However, some privacy advocates are indeed working on a...
A new assortment of documents have been released by WikiLeaks revealing National Security Agency has been spying on its German associates who are...
Google Apologizes after its Image Recognition Software Mistakenly Tags Black couple as Gorillas. A computer programmer Jacky Alcine saw his and a...
The meltdown of Donald Trump’s empire is slowly but continuously gaining momentum and the latest to add more misery to the real...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams