A great news for Makers and Arduino lovers: Microsoft announced a new partnership with Arduino to make their Windows as First ever...
Finding someone’s age and gender, no longer a problem! With Microsoft’s newest API all the age secrets are to be exposed —...
The information needed to hack a sophisticated military drone is already available on internet and hackers could use this how-to guide for...
It has been almost 25 years, but the infamous video of ‘Rodney King being beaten up by L.A. police officers’ is still...
Google has taken a stand against phishing attacks by revealing Password Alert: a Chrome extension designed to neutralize them after a user...
Budget airline Ryanair has been the victim of a major banking hack, with more than $5 million stolen from its business account...
“It won’t happen to me” is often uttered by citizens and businesses who are adamant that they won’t become a victim of...
On 30th April, 2015, a Palestinian-friendly hacker going with the online handle of HolaKo hacked and defaced a subdomain of Rediff.com, a...
It happened about two hours ago. Facebook nearly gave me and my friend Arpit, the co-founders of fossBytes, a massive heart-attack. Yes,...
It is no secret how even the world’s most unfortunate tragedies such as air crashes, hurricanes, earthquakes and tsunamis are capitalized on...
People do dumb things on Facebook, but liking your own picture when it’s posted by the police for an arrest? Come on man! It’s...
Microsoft is busy launching new products and services from its Developer Build Conference 2015. Yesterday we saw the unveiling of Microsoft Edge...
Do you know the difference between a “hacker” and a “cyber criminal”? Many of us often use these two terms without knowing...
Google has recently unveiled a new Chrome extension called Password Alert, designed as a defense tool for phishing threats by issuing an...
Beware of that accident scam call or text: losing money isn't the only risk.
Do you want to experience all the new features of Google’s new browser for Android before everyone else? Here’s a good news....
What's the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.
A security expert has had a computer chip designed for tracking cows implanted into his hand by an 'unlicensed amateur' to hack...
A Canadian woman has been arrested by the Royal Canadian Mounted Police for hacking computers, taking over their webcams and spying on people....
Hackers are targeting users with a fake Facebook email tricking them into clicking an attached application to generate a trusted connection to the network— Attachment contains...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft