Source: TechCrunch From Last November, Microsoft was teasing its developers by saying that some of the key features for Microsoft .NET platform...
Microsoft released a new development tool – Visual Studio Code – that works Windows, Linux, and Mac. This is being seen as...
The South African Right2Know campaign has released its “Big Brother Exposed” report. The report revealed details about the way activists and community leaders...
Today even the big financial players like PayPal, who are expected to deliver secured services to its users, aren’t safe from the...
The importance of a Smartphone was redefined when Azer Jaafoura along with his team members thought about helping Alzheimer’s patients a year...
For the past few days, we have been hearing about the Great Cannon. This Great firewall system developed by China is terrorizing the...
On 25th April, 2015, Indonesian hackers going with the group handle of Gantengers Crew hacked and defaced the Online Resources domain of US based Financial Services...
You will not need your fingerprints or the face-detection feature of your phone very soon to ensure that your tablet or smartphone...
University of Washington in Seattle’s research team managed to hijack a tele-operated surgical robot. This exposed major security vulnerabilities in machines that...
Twenty five international cyber criminals (who were involved hacking into banking systems and making of clone payment cards) are arrested by the...
Now Google lets you run your Android apps in Chrome with its ARC Welder app. They recently released the beta version of...
OFAC will soon be enforcing economic and trade sanctions against individuals and groups outside the United States that use cyber attacks to...
What kind of punishment best fits a convicted hacker? Jail time for serious computer crimes is almost a certainty, but for one...
Have you ever thought of making some cool stuff at home? Well if not, you are about to learn how to make an electric...
For all of you who want to know what currently Google is planning to work on, the answer is “Project Fi”— Now...
Privacy is one of the biggest concern to everyone these days, and to respect your privacy, few days ago Google enabled the option...
In the past, whistleblower Edward Snowden has exposed numerous hacking operations run by the US intelligence agency NSA. Out of all these...
Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor...
Phishing is the method of stealing login info(usernames and passwords) by directing the victim to a clone(fake) login page, that logs the...
Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment