The 28 EU member states have taken a significant step towards a historic overhaul of EU-wide data protection laws, first proposed three...
Do you remember asking your friend with a Camera on a Trip to share the photographs with you? Or do you remember...
Just when you thought that you’ve had enough social networking today and you definitely need a new social network around, here comes...
It has happened to most of us. You deleted a file and realize you need it back. But is it really deleted?...
Due to a security flaw, researcher Austin Epperson took control of a page of Uber’s website and displayed the ad of its arch-rival...
Joe Siegrist from LastPass, a famous password manager program, admitted that its database comprising of email addresses, server per user salts, password...
Popular online password vault provider LastPass has warned users to update their master account passwords after their network was hacked.
Much ink has been spilt about the shortage of people trained in information security – especially the lack of women in the...
Facebook timelines nowadays are displaying a new phishing scam message with the title “Here’s the Link HeHe.” The text of this scam...
In April 2015, we reported how Ask.com toolbar is working as a malware to hijack your computer. Now proving our claim right, previous...
Awesome News for Wikipedia Readers- Encrypted Connections Coming Your Way Pretty Soon. Currently, data between users and Wikipedia.com is unencrypted, and this increases...
Governments unsurprisingly are trying to buy unpatched security exploits in the name of surveillance or cyber defence but refrain from admitting it....
Microsoft is trying desperately to convince the users to upgrade their Windows 7 and Windows 8.1 PCs to the next iteration to...
Few times you have to give up on loading multiple website with slow internet connection or having problem with internet, or when...
Wikimedia has announced that all of its web properties – including the enormously popular crowd-sourced dictionary Wikipedia – will now use HTTPS...
The vintage Ask toolbar that you can spot in your computer’s web browser has now been termed as threat to your PC...
You, the usual and the average consumer, doesn’t know the boundaries that define the exploitation when it comes to the net neutrality...
Who would have thought something that started as a mischief could go on to become the heart of a billion people’s social...
Tox is yet another example of cyber justice that has been meted out by cyber criminals. In this case, Tox sends a...
Have you ever wondered how musicians write music? Do you think it’s possible to technically generate a composition and write lyrics to...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment