Remember those rumors about Anonymous hacktivists creating their own social media? Well, they aren’t! However, some privacy advocates are indeed working on a...
A new assortment of documents have been released by WikiLeaks revealing National Security Agency has been spying on its German associates who are...
Google Apologizes after its Image Recognition Software Mistakenly Tags Black couple as Gorillas. A computer programmer Jacky Alcine saw his and a...
The meltdown of Donald Trump’s empire is slowly but continuously gaining momentum and the latest to add more misery to the real...
A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal...
A key update to the PCI standard has been issued by the PCI standards body, the Payment Card Industry Security Standards Council...
If you are well-informed about the basics of online security and anonymity, then you would be aware of the importance of IP...
We Live Security looks at six of the biggest online gaming hacks to date – From Xbox Live and PSN, to Big...
Everyone now a days has one or two additional pendrives and hard disks with them because pendrive makes sharing of data very...
The cyber war between Armenians and Azerbaijani hackers is never ending. Just like today when Armenian hackers leaked trove of data containing personal...
Every Android mobile has Google Play Store pre-installed on its device. Play Store is an awesome market to download some awesome applications...
Today the Linux Foundation announced a new initiative called R Consortium- a group to unite the users of the open-source R programming...
Links traced to “Animal Farm” group and State Sponsored cyber criminals who already have targeted Syrian and Iranian computers in 2013. Bratislava,...
Facebook is the number one social networking website with more than one billion active users. All of us have a Facebook profile...
Yes, you heard that right. You can access your computer’s hard drive with your smartphone in few simple steps. For this, you...
A series of more than 160 data breaches have struck local authorities in Norfolk, Suffolk and Cambridgeshire over the past year, according...
Facebook is the No.1 Social Networking website with more than 1.2 Billion active users. Everyone posts images on FB. Whenever we surf...
There may be many reasons to download torrent files using IDM. It may be that you get good speed using IDM, no...
If you were busy celebrating the fact that the Patriot Act will bring an end to NSA’s mass surveillance, you should take...
The online hacktivist Anonymous conducted a massive DDoS attack on the official website of Canadian Security Intelligence Service (CSIS) and forced it to go...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage