The British government has passed legislation amending the Computer Misuse Act to prevent GCHQ, the police and intelligence services from prosecution over...
The officials at The Penn State College of Engineering announced that its servers were attacked in two “extremely sophisticated” cyber-attacks and as...
The online hacktivist AnonGhost just hacked, defaced the official website of Wayne Country Sheriff’s department and publicly leaked its database containing login...
Anonymous hacktivist breached a government of Chile website and leaked login details of officials in support of student protests against the government’s...
Our name is an integral part of our existence and this is our basic identity. But the way people name their children...
Installing a fresh Windows 8.1 hasn’t been the easiest thing in the world till now as Windows 8 users needed a licensed...
Are you good at programming and do you call yourself a computer expert? Here’s a chance to earn a million miles and...
The concept of Transparency carries a simple meaning, if practiced by governments it will empower the masses, place them in a position...
mSpy, the notorious software-as-a-device product which so far enabled two million plus people spy on their spouses and kids, is believed to...
Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been...
Many people feel the need to use Torrents to pirate software that would normally be paid for, however by doing this torrent...
In this world 36 million kids have taken part in Hour of code activities, by helping them to develop their skill in...
A couple of months ago we reported how [linked url=”https://www.hackread.com/app-store-phishing-email-stealing-apple-user-credentials/”]an app store phishing email is stealing Apple user credentials[/linked]. Now a government of Vietnam domain...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars...
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet's impact on security research.
A year after Google introduced its controversial 'right to be forgotten' feature, the search giant has published some statistics about its implementation.
The official mobile website of American daily newspaper The Washington Post was hacked by Syrian Electronic Army (SEA), a group loyal to Syrian President Bashar...
If you are a hacker or an IT security researcher, United Airlines has announced its first ever Bug Bounty program for you...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams