A British bank has been trialling a different type of biometrics, allowing their customers to confirm their identity via heartbeat according to...
Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.
One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at...
One of London’s tube stations will become more accessible for vision impaired and blind travelers by an amazing new Bluetooth setup. According...
Using VPN is a crime under UAE’s cyber laws – Anyone found using VPN can be charged for going against the country’s...
The controversial cybersecurity legislation Cybersecurity Information Sharing Act (CISA) will be passed by the Senate Intelligence Committee on Thursday, said the panel’s...
It has been found that hackers can now easily abuse any website’s domain name based email addresses through the Google Apps for...
In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity...
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a...
The Killer USB USB drives are known be humble creatures that help you out by transferring your data. But, what if a...
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of...
A number of websites have been put at risk due to a very popular plugin of the WordPress content management platform vulnerability...
US Consumers looking for a wireless steal can now get encrypted free monthly phone service thanks to FreedomPop, the firm behind the...
Around 3,000 new security professionals will be added to the United States military’s infosec unit by 2016, according to reports. It says that...
Phone hacking ruined the lives of celebrities, and - in at least one case - almost drove a victim to suicide.
The online Turkish hacktivist group RedHack has hacked and defaced the official website of Istanbul Police Association in tribute to Berkin Elvan, a 15-year-old teenager who...
WordPress’s MainWP Child Plugin has vulnerability… and it is very much exploitable. Researchers at Sucuri have identified a vulnerability in the MainWP...
Even after almost a year, Facebook apparently has failed to fix a bug that lets attackers hijack accounts on sites that leverage...
A lawsuit has been filed against NSA (National Security Agency) to preserve the rights of the 500 million Wikipedia users who visit...
Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files