The online hacktivist Anonymous hacked and defaced the the official website of Montreal Police Union (Fraternité des policiers et policières de Montréal)...
An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a...
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help...
According to the latest documents revealed by NSA whistleblower Edward Snowden, the National Security Agency (NSA) and its British counterpart, Government Communications...
I’m fan of Facebook’s facial recognition technology and how efficiently is tags you automatically in pictures. Facebook is constantly improving its technology...
Linux was originally developed as a free operating system for personal computers based on the Intel x86 architecture, but has since been...
Hackers are being blamed for an attack which grounded 1,400 passengers set to fly on Polish airline LOT.
Yesterday in Poland, 10 flights operated by Poland’s national airline LOT were grounded after facing a flight hack attack on its computer...
A Sahrawi hacker going with the handle of Kuroi’SH hacked and defaced the Google Vanuatu domain in support for the freedom of Western Sahara....
In the annual report of the Electronic Frontier Foundation, big players like WhatsApp and AT&T have been ranked worst in protecting your...
Someone hacked the official Twitter account of UK based controversial Television personality, The Sun’s columnist Katie Hopkins and threatened to leak a sex...
Learning coding from scratch could be a tough task and it could take years of hard work to master a language. So,...
With the increased intrusion of technology, the threats of security breaches into out internet-governed lives have increased manifold. Each day we get...
Android Bug Bounty Program is here and it’s your time to report bugs and get paid. Google’s bug bounty or security rewards...
It’s an old news that Windows 10 will be available as a free download to Windows 7 and Windows 8 users. This...
Facebook hacking has been a major “topic” for the curious user,but today i’ll be focusing on an easy trick to send messages...
WikiLeaks, a whistle-blowing site has published 276,394 new docs taken from Sony in Nov by an anonymous attacker. It adds to the...
Remember that Russian paramedic Tatiana Kulikova? Remember her habit of taking selfies with Dying Patients and uploading them on social media? Well, she was...
Facebook’s current rival apparently being backed by the famous hacker group Anonymous. A new social network is hoping to surpass Facebook and other...
Since the last two years, the privacy focused search engine DuckDuckGo has witnessed a phenomenal 600% growth. The search engine was launched...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan