Despite the holiday season though, you can't guarantee that hackers and cybercriminals won't be on the hunt for weak and vulnerable social...
Last week we reported on the Overwatch service that pinpoints every fake cell tower spying and tracking your smartphone. Now we present an...
Recently Google announced its current experimental program named Vulnerability Research Grants (VRG). No doubt it is a great concept. In this program...
Biohackers Identified the Way to Transform your Eyes into Night Vision Goggles — It requires injecting your eye balls with a chemical...
Anonymous hacktivist group continues its efforts to expose social media profiles of the notorious rebel group Islamic State of Iraq and Syria/ISIS militants...
ATTENTION!! Programmers, coders and hackers, students and professionals, techies and newbies – GEAR UP!! The countdown to one of the biggest programming...
The Pirate Bay has been facing extreme pressure from the Hollywood and music industry backed domain name industry. In recent times, The...
Search Engine Optimization: it's an essential component of internet marketing strategy, I guess, but one with a bad public image, especially in...
Energy companies have been targeted with a new multi-stage malware attack used to infect company computers and steal sensitive data.
The humble password has struggled in recent years, and is often seen as vulnerable to attackers. The interactive infographic below offers up...
Good Bye GPS — DARPA to present another position-tracking technology. The U.S government’s Defence Advanced Research Projects Agency (DARPA) has prioritized the development...
Think Do-It-Yourself Computing, Think Raspberry Pi! Such a phenomenon this mini-computer has been! From the Pandora’s Box of Projects that is Kickstarter...
Researchers at MDSec, an IT security firm, have identified a method that allows thieves and hackers to bypass iPhone’s lockscreen utilizing equipment...
A new email that has been targeting PayPal users states that the company is examining a payment reversal regarding Apple and user’s...
Online retailers battling with fraud prevention are losing out on genuine sales by treating their customers like criminals, according to a new...
Today is World Backup Day, and it goes without saying that backing up data is a thoroughly sensible thing to routinely get...
Queen Elizabeth has been consulting one of the United Kingdom's most prominent cybersecurity experts, leading to speculation the Royal Family may be...
Did thinking the most secure password takes out the best of you?? And, still, it seems that it is not sufficient. Your first...
Microsoft has finally rolled out the Spartan browser as an official release. This is one of the most anticipated features of Windows...
In a latest video footage from Anonymous, the notorious hacker group, a masked individual appears in a suit and delivers a well-structured...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams