Arab hackers are using pictures of IDF’s women division to hack Israeli military servers — And it’s a success. Several computer networks belonging...
All you need to do is search for your Android device, mobile phone or tablet on Google – The search engine will...
Remember how we told you that Machine Learning is fast becoming the new buzzword in town. Rapid developments in this field are...
The Ask.com toolbar is not a handy tool — it’s a Curse because it never goes away. Apparently, Ask.com toolbar hijacks your...
Chris Roberts (World Labs’ IT security expert) who recently identified risks in airplane in-flight entertainment systems became the target of FBI investigation himself....
Hundreds and thousands of documents and emails breached during last Christmas' cyberattack on Sony Pictures have been published on WikiLeaks, reports the...
How much of people's willingness to ignore security warnings is down to their brains?
Tax Return-themed Emails make Users in America the Target of Ransomware – Attackers sending genuine-looking Internal Revenue Service (IRS) tax refund messages. Today,...
Team System DZ is known for hacking high-profile websites – Their latest target was the University of Toronto and they successfully achieved...
The famous international, non-profit, journalistic organisation WikiLeaks published thousands of hacked Sony Emails. You can now access, read and search all the...
The new post that is spreading like wildfire around Facebook claims that click the picture and see how a ‘guy removes his...
According to a new report, hundreds of commercial planes are vulnerable to hacking due to their very own airplane WiFi network for passengers....
DEA has been a client of the controversial Italian surveillance tech firm Hacking Team since 2012 — DEA has bought spyware capable...
I am always a victim of lots of useless and redundant data in my PC. Out of all these useless files, a good...
The on-plane Wireless systems can easily be hacked by compromising the websites visited by travelers — This happens if same routers/wiring is...
Planes offering in-flight Wi-Fi are vulnerable to being hacked and controlled by onboard passengers, a US government watchdog has warned.
The Data Security and Breach Notification Act has passed The House Energy and Commerce Committee by a vote of 29-22, reports The...
Anonymous GhostSec hacktivists have attacked the official support website of John McMahon (mcmahonforsheriff.com), who is a severing Sheriff in the San Bernardino County Police, California. Hackers have left...
The new “Trusted Voice” Android app allows you to unlock your smartphone with your own voice — No pin, no password, just your...
Paedophiles reportedly have been trading child sexual abuse images for bitcoin, revealed the Internet Watch Foundation/IWF in its annual report for 2014....
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024