If you are Linux enthusiast, you would be aware of the fact that a new Ubuntu release is soon followed by the...
New Google Chrome extension helps color-blind users surf Internet without any problem. To pass the leisurely time, the Internet isn’t always one of the...
A Three-judge panel of the Second Circuit Court of Appeals decided that the telephone metadata collection program of NSA is illegal under...
The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals...
The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we...
In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then...
Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with...
Google’s recent study shows the effect of the Ad Injection in our digital media. We already know and hate the ad frauds,...
A fake email supposedly sent by ‘Apple Genius Assistance’ informs that users need to review their Apple ID information within 2 days...
A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and...
A new Edward Snowden document released by The Intercept describes the way NSA converted voice calls into searchable text files for about...
Concern over the security of Windows in China has led to a 'gold rush', as Chinese firms race to fill the gap...
Researchers have uncovered a new malware which will try to 'destroy' the computer, reports Cisco. Let's understand how it really is.
Nikola Labs has launched an iPhone case that transforms radio frequencies into DC electrical current and thus, can charge devices. The first device...
Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.
Cyber criminals and security researchers face each other each day in a never ending battle. Both are two sides of a single...
An Australian man facing 25 hacking charges has fled to Europe, ahead of being trialled for attacks which targeted major computer firms.
GitHub, the web-based Git repository hosting service is down right now and Turkish hackers from Turk Hack Team claim they are behind this attack....
Smartphone authentication: is biometric technology ready to replace PINs and passwords?
You may be a UFC champ in real life but when it comes to online world, hackers have an upper hand. A group...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files