French Government In No Mood to Grant “Free Speech” right – France blocking Websites that propagate views the government doesn’t like. In what...
A hacker group labelled “Who am I = No nuclear power” released data regarding the advanced power reactor (APR) 1400 and system...
It seems banning the usage of VPN (Virtual Private Network) wasn’t enough as the Telecommunications Regulatory Authority (TRA) of United Arab Emirates (UAE) has now blocked...
Medical and financial data of around 11 million Premera Blue Cross customers has potentially been exposed due to a breach that apparently...
Apparently, a majority of iOS and Android apps are still potentially vulnerable to dangerous FREAK attacks that can easily compromise encrypted data....
Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach....
Travelers’ phone tracking strategy minimize Cincinnati airport’s Security line by one-third. We all know how miserable airport security processes are for the...
USB drives have been known to carry viruses and malware, but a Russian electronics expert has now created a thumb drive that...
Coinapult, a long-running bitcoin wallet service, announced on Monday that its hot wallet had been compromised to the tune of 150 coins...
We all know that Windows will be releasing free upgrade for Windows 8 and Windows 7 users. Today Microsoft announced that it...
Unhackable Drone Helicopters a must have for the Pentagon before 2018 – The Pentagon is looking for unhackable drone helicopters to avoid...
We get many question daily asking us how to hack games such as Clash of Clans this article explains why server side...
Hey everyone, on some user request I wrote about How to Enable Hidden Offline Browsing In Google Chrome last time. And as expected,...
Samsung has done it yet again.. It has managed to do something entirely unique and introduce a new concept to the techno...
The ex-NSA spy and now a Whistleblower Mr. Edward Snowden said that terrorism cannot be stopped through mass surveillance tactics. He slammed...
Yahoo made two major announcements this week regarding its security protocol. One was the launching of the new “on-demand” password service and...
Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and...
FOX31 Denver discovered a hidden camera which captured and recorded facial features and license plate numbers of whoever left the Golden Post...
Advantage Dental has sent out notices to 151,626 customers after a hacking which may have led to the leaking of valuable patient...
Shane Tusch learned about the authenticity of Facebook’s suicide prevention tools the hard way – What started as an attempt to check...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams