A MacRumors Forum user has stumbled upon the fact that when installing the iOS 9 (beta version), the operating system will delete...
Europol is going after people using social media platforms to spread ISIS propaganda. It was the Anonymous hacktivist group who took the...
A new photo-sharing application has been released by Facebook this week called Moments. This app utilizes facial recognition technology to tag and...
The online hacktivist Anonymous hacked and defaced the the official website of Montreal Police Union (Fraternité des policiers et policières de Montréal)...
An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a...
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help...
According to the latest documents revealed by NSA whistleblower Edward Snowden, the National Security Agency (NSA) and its British counterpart, Government Communications...
I’m fan of Facebook’s facial recognition technology and how efficiently is tags you automatically in pictures. Facebook is constantly improving its technology...
Linux was originally developed as a free operating system for personal computers based on the Intel x86 architecture, but has since been...
Hackers are being blamed for an attack which grounded 1,400 passengers set to fly on Polish airline LOT.
Yesterday in Poland, 10 flights operated by Poland’s national airline LOT were grounded after facing a flight hack attack on its computer...
A Sahrawi hacker going with the handle of Kuroi’SH hacked and defaced the Google Vanuatu domain in support for the freedom of Western Sahara....
In the annual report of the Electronic Frontier Foundation, big players like WhatsApp and AT&T have been ranked worst in protecting your...
Someone hacked the official Twitter account of UK based controversial Television personality, The Sun’s columnist Katie Hopkins and threatened to leak a sex...
Learning coding from scratch could be a tough task and it could take years of hard work to master a language. So,...
With the increased intrusion of technology, the threats of security breaches into out internet-governed lives have increased manifold. Each day we get...
Android Bug Bounty Program is here and it’s your time to report bugs and get paid. Google’s bug bounty or security rewards...
It’s an old news that Windows 10 will be available as a free download to Windows 7 and Windows 8 users. This...
Facebook hacking has been a major “topic” for the curious user,but today i’ll be focusing on an easy trick to send messages...
WikiLeaks, a whistle-blowing site has published 276,394 new docs taken from Sony in Nov by an anonymous attacker. It adds to the...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams