A breakthrough in e-voting from the University of Birmingham suggests that the old ballot box tradition may come to an end in...
Here’s a news that will cheer up all the activists, criminals, activists and whistle blowers. Now they have got a new tool...
The web is an interconnected maze consisting of people, organization and computers. The easiest way to hack into such a system is...
The hacktivists of Anonymous are once again back in the news with their latest attack. A hacker claiming to be affiliated with...
In March, Motherboard reported Uber accounts had been stolen by hackers who were selling them on public forums for as low as...
Today privacy is the greatest concern in our world dictated by our online presence. Those who are aware of the consequences of...
Researchers have developed a video camera which can record non-stop — The camera is one of its kind. Columbia University researchers have developed...
Famous whistleblowers Chelsea Manning, Edward Snowden and Julian Assange can be seen standing in Berlin now as their life-size bronze statutes were...
Harley says that scams and social engineering have been a constant in cybercrime - but in the past few years, some scams...
It's National Small Business Week in the U.S. and, because properly protecting the digital assets of your small business could be vital...
The FBI is taking cybercrime seriously. Here are some of the most wanted hackers in the world, and what they're wanted for...
Cyber-security is one of the major concerns of online users these days and hackers are an inevitable part of this discussion. Every...
A warning has been issued by the FAA regarding the software glitch in the system of Boeing’s 787 Dreamliner — This glitch...
Keeping Anonymous hackers out from news is simply impossible, the hacktivist movement is active 24 x 7 and you can always expect them...
Delivering banking malware through Microsoft Word documents has been a less common method. However, it is currently being used for spreading malicious...
In a recent blog post, Mozilla has showed its intent to phase out the non-secure websites i.e. the HTTP. Earlier this week,...
Ten individuals of Nigerian origin have been arrested by Guardia di Finanza for laundering millions of pounds acquired from frauds causing loss...
After successful OpIsrael, AnonGhost is now targeting random but high-profile websites around the world. The latest in line is Red Bull Malaysia. The...
Microsoft’s Build 2015 conference is now over and we were greeted with many pleasant surprises. According to me, one of the biggest...
Expect exposure of confidential news pieces and government/corporate classified documents every now and then because WikiLeaks, the anti-secrecy group has re-launched its...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams