Researchers have spotted a j.mp shortened URL being shared by fake accounts within Facebook recently targeting users with phishing link. Hackers are sending...
The official website of embassy of Nepal in Washington was hacked by a group of Moroccan hacker not happy with American invasion of Iraq and...
The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information...
Dubai: If you are living in UAE, you should know the dangers of flipping middle finger at someone as it could land you in prison. Nonetheless,...
Every Android user should be familiar with pattern lock security system. Every Smartphone has the option called Patter Lock which is very popular...
Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data...
A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.
A new worm is infecting routers in order to commit social networking fraud, hijacking victims' internet connections in order to "like" posts...
Creating fake social media accounts has been the favorite trick of hackers and scammers for interacting with potential victims. However, thanks to...
A high school boy might have to face state and federal charges for allegedly hiring a third party and launching a DDoS...
From using PCs and cell phones to watch online movies and playing games, wireless technology has advanced greatly and made life easier...
Reportedly BitFinex was hacked but due to strict security measures implementation just minimal amount was lost. BitFinex keeps more than 99.5% of...
It would not be an exaggeration to say that the present age is the age of smartphones. They have invaded our lives...
Do you know that not all web sites honor the native Do Not Track feature of your web browser? Even in the...
Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.
Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless...
As a result of a midnight session, the American Senate has voted down the USA Freedom Act- the basis of NSA’s mass...
The online hacktivist Anonymous breached into the official website of Thailand Senate and Public Health Ministry, ending up leaking login credentials against country’s alleged...
The anti-Bashar Al Assad hacker from Syria hacked into the official website of Uzbekistan Embassy in Kuwait and demanded governments around the world...
When it’s about performing surgeries on vital organs, today’s advanced imaging techniques such as CT scans, MRIs and ultrasound machinery have made...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft