Our name is an integral part of our existence and this is our basic identity. But the way people name their children...
Installing a fresh Windows 8.1 hasn’t been the easiest thing in the world till now as Windows 8 users needed a licensed...
Are you good at programming and do you call yourself a computer expert? Here’s a chance to earn a million miles and...
The concept of Transparency carries a simple meaning, if practiced by governments it will empower the masses, place them in a position...
mSpy, the notorious software-as-a-device product which so far enabled two million plus people spy on their spouses and kids, is believed to...
Twitch has been making some very awful encoding and additional bad choices for streamers and viewers of Twitch.tv. This method has been...
Many people feel the need to use Torrents to pirate software that would normally be paid for, however by doing this torrent...
In this world 36 million kids have taken part in Hour of code activities, by helping them to develop their skill in...
A couple of months ago we reported how [linked url=”https://www.hackread.com/app-store-phishing-email-stealing-apple-user-credentials/”]an app store phishing email is stealing Apple user credentials[/linked]. Now a government of Vietnam domain...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars...
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet's impact on security research.
A year after Google introduced its controversial 'right to be forgotten' feature, the search giant has published some statistics about its implementation.
The official mobile website of American daily newspaper The Washington Post was hacked by Syrian Electronic Army (SEA), a group loyal to Syrian President Bashar...
If you are a hacker or an IT security researcher, United Airlines has announced its first ever Bug Bounty program for you...
Summary: In a bid to raise awareness regarding the way malware can affect GPUs, a team of developers recently created a Linux...
Lack of some elementary security measures can risk your router’s security and this has stemmed to grow into a large-scale denial-of-service (DDoS)...
Summary: Earlier this week Bob Sullivan reported that hackers can easily access Starbucks customer accounts by stealing their username and passwords and naturally Starbucks...
The CrowStrike researchers discovered that any attacker can burst out of specific virtual machines and exploit whatever is running nearby — The...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment