A UK man has been charged this week with a non-custodial sentence, after a ransomware infection on his computer made him confess...
New Breakthrough suggests that Fingerprints will soon reveal to cops if suspects are High on cocaine. According to advancement in “drug test”...
Australians were tricked out of around AUS$82 million (US$66 million) during 2014, with online dating scams accounting for the biggest losses.
The British government has passed legislation amending the Computer Misuse Act to prevent GCHQ, the police and intelligence services from prosecution over...
The officials at The Penn State College of Engineering announced that its servers were attacked in two “extremely sophisticated” cyber-attacks and as...
The online hacktivist AnonGhost just hacked, defaced the official website of Wayne Country Sheriff’s department and publicly leaked its database containing login...
Anonymous hacktivist breached a government of Chile website and leaked login details of officials in support of student protests against the government’s...
Our name is an integral part of our existence and this is our basic identity. But the way people name their children...
Installing a fresh Windows 8.1 hasn’t been the easiest thing in the world till now as Windows 8 users needed a licensed...
Are you good at programming and do you call yourself a computer expert? Here’s a chance to earn a million miles and...
The concept of Transparency carries a simple meaning, if practiced by governments it will empower the masses, place them in a position...
mSpy, the notorious software-as-a-device product which so far enabled two million plus people spy on their spouses and kids, is believed to...
Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been...
Many people feel the need to use Torrents to pirate software that would normally be paid for, however by doing this torrent...
In this world 36 million kids have taken part in Hour of code activities, by helping them to develop their skill in...
A couple of months ago we reported how [linked url=”https://www.hackread.com/app-store-phishing-email-stealing-apple-user-credentials/”]an app store phishing email is stealing Apple user credentials[/linked]. Now a government of Vietnam domain...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars...
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet's impact on security research.
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files