Medical and financial data of around 11 million Premera Blue Cross customers has potentially been exposed due to a breach that apparently...
Apparently, a majority of iOS and Android apps are still potentially vulnerable to dangerous FREAK attacks that can easily compromise encrypted data....
Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach....
Travelers’ phone tracking strategy minimize Cincinnati airport’s Security line by one-third. We all know how miserable airport security processes are for the...
USB drives have been known to carry viruses and malware, but a Russian electronics expert has now created a thumb drive that...
Coinapult, a long-running bitcoin wallet service, announced on Monday that its hot wallet had been compromised to the tune of 150 coins...
We all know that Windows will be releasing free upgrade for Windows 8 and Windows 7 users. Today Microsoft announced that it...
Unhackable Drone Helicopters a must have for the Pentagon before 2018 – The Pentagon is looking for unhackable drone helicopters to avoid...
We get many question daily asking us how to hack games such as Clash of Clans this article explains why server side...
Hey everyone, on some user request I wrote about How to Enable Hidden Offline Browsing In Google Chrome last time. And as expected,...
Samsung has done it yet again.. It has managed to do something entirely unique and introduce a new concept to the techno...
The ex-NSA spy and now a Whistleblower Mr. Edward Snowden said that terrorism cannot be stopped through mass surveillance tactics. He slammed...
Yahoo made two major announcements this week regarding its security protocol. One was the launching of the new “on-demand” password service and...
Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and...
FOX31 Denver discovered a hidden camera which captured and recorded facial features and license plate numbers of whoever left the Golden Post...
Advantage Dental has sent out notices to 151,626 customers after a hacking which may have led to the leaking of valuable patient...
Shane Tusch learned about the authenticity of Facebook’s suicide prevention tools the hard way – What started as an attempt to check...
A PhishTank has been located where the Apple store users have been the victims of phishing emails. OVH, very well-known web hosting...
A senior official in the Dubai Police force has stated that the use of Virtual Private Networks is illegal across the United...
An individual seems to be threatening the South Korean government with the confidential information associated with the country’s power plants and says...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer