A Three-judge panel of the Second Circuit Court of Appeals decided that the telephone metadata collection program of NSA is illegal under...
The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals...
The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we...
In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then...
Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with...
Google’s recent study shows the effect of the Ad Injection in our digital media. We already know and hate the ad frauds,...
A fake email supposedly sent by ‘Apple Genius Assistance’ informs that users need to review their Apple ID information within 2 days...
A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and...
A new Edward Snowden document released by The Intercept describes the way NSA converted voice calls into searchable text files for about...
Concern over the security of Windows in China has led to a 'gold rush', as Chinese firms race to fill the gap...
Researchers have uncovered a new malware which will try to 'destroy' the computer, reports Cisco. Let's understand how it really is.
Nikola Labs has launched an iPhone case that transforms radio frequencies into DC electrical current and thus, can charge devices. The first device...
Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.
Cyber criminals and security researchers face each other each day in a never ending battle. Both are two sides of a single...
An Australian man facing 25 hacking charges has fled to Europe, ahead of being trialled for attacks which targeted major computer firms.
GitHub, the web-based Git repository hosting service is down right now and Turkish hackers from Turk Hack Team claim they are behind this attack....
Smartphone authentication: is biometric technology ready to replace PINs and passwords?
You may be a UFC champ in real life but when it comes to online world, hackers have an upper hand. A group...
The online hacktivist Anonymous claims to leak emails and passwords of Baltimore Police Department (BPD) against the death of Freddie Gray, a 25-year-old African-American Baltimore resident...
Votr is an app that uses your postcode to organize tweets of the candidate and offers you to swipe just like the...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams