The concept of Transparency carries a simple meaning, if practiced by governments it will empower the masses, place them in a position...
mSpy, the notorious software-as-a-device product which so far enabled two million plus people spy on their spouses and kids, is believed to...
Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been...
Many people feel the need to use Torrents to pirate software that would normally be paid for, however by doing this torrent...
In this world 36 million kids have taken part in Hour of code activities, by helping them to develop their skill in...
A couple of months ago we reported how [linked url=”https://www.hackread.com/app-store-phishing-email-stealing-apple-user-credentials/”]an app store phishing email is stealing Apple user credentials[/linked]. Now a government of Vietnam domain...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars...
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet's impact on security research.
A year after Google introduced its controversial 'right to be forgotten' feature, the search giant has published some statistics about its implementation.
The official mobile website of American daily newspaper The Washington Post was hacked by Syrian Electronic Army (SEA), a group loyal to Syrian President Bashar...
If you are a hacker or an IT security researcher, United Airlines has announced its first ever Bug Bounty program for you...
Summary: In a bid to raise awareness regarding the way malware can affect GPUs, a team of developers recently created a Linux...
Lack of some elementary security measures can risk your router’s security and this has stemmed to grow into a large-scale denial-of-service (DDoS)...
Summary: Earlier this week Bob Sullivan reported that hackers can easily access Starbucks customer accounts by stealing their username and passwords and naturally Starbucks...
The CrowStrike researchers discovered that any attacker can burst out of specific virtual machines and exploit whatever is running nearby — The...
A Russian hacking group planned on launching cyberattacks against several banks around the world, according to SC Magazine.
Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download...
The USA Freedom Act was passed by the House of Representatives on Wednesday and the bill, which is going to change the...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw