Android phone users have long shared the view that, despite the continual announcements of ongoing security breaches in an evermore technological world,...
Consumers in the UK would be happy to share their DNA if it would help secure their financial and personal information, according...
In October last year, we reported how a 10-year-old filipino virtual girl “sweetie” takes pedophile to prison in Australia for good. Now a...
The St. Louis Cardinals, one the United States's top major league baseball teams, is being investigated for allegedly hacking into the computer...
Someone hacked the official website of Lithuanian Armed Forces and posted false information about NATO ready to attack Kaliningrad Oblast. A group of unknown...
Another day, another Facebook phishing scam — Facebook users must be cautious since a new phishing scam message is circulating on the...
A San Francisco Bay Area based artist and designer Ted Kessler has always yearned to merge art with science. A bachelor in...
‘Stolen Foxconn certs’ used for embedding Duqu 2.0 malware into Windows PC — The crafty super-sophisticated malware infiltrated Kaspersky Labs. Reportedly, Duqu...
The 28 EU member states have taken a significant step towards a historic overhaul of EU-wide data protection laws, first proposed three...
Do you remember asking your friend with a Camera on a Trip to share the photographs with you? Or do you remember...
Just when you thought that you’ve had enough social networking today and you definitely need a new social network around, here comes...
It has happened to most of us. You deleted a file and realize you need it back. But is it really deleted?...
Due to a security flaw, researcher Austin Epperson took control of a page of Uber’s website and displayed the ad of its arch-rival...
Joe Siegrist from LastPass, a famous password manager program, admitted that its database comprising of email addresses, server per user salts, password...
Popular online password vault provider LastPass has warned users to update their master account passwords after their network was hacked.
Much ink has been spilt about the shortage of people trained in information security – especially the lack of women in the...
Facebook timelines nowadays are displaying a new phishing scam message with the title “Here’s the Link HeHe.” The text of this scam...
In April 2015, we reported how Ask.com toolbar is working as a malware to hijack your computer. Now proving our claim right, previous...
Awesome News for Wikipedia Readers- Encrypted Connections Coming Your Way Pretty Soon. Currently, data between users and Wikipedia.com is unencrypted, and this increases...
Governments unsurprisingly are trying to buy unpatched security exploits in the name of surveillance or cyber defence but refrain from admitting it....
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage