Last month security researchers discovered an undetectable malware installed in the hard drives by the American National Security Agency (NSA) to spy...
Files of over 20 Games Encrypted by TeslaCrypt Ransomware – Out of 185, 50 file extensions are game-oriented. TeslaCrypt is a crypto-ransomware that...
Facebook users, if you have clicked the Ow.ly link (URL shortening service) then you might have gotten your computers infected by a worm. The link is being...
Hello everyone, I remember the last time when I shared an article on How To Watch and Download YouTube Videos Offline, someone asked me if I...
Do you use Sony PlayStation? Do you purchase related products or gaming content from Sony’s online store? Well, if you do we warn you...
A New York based accessories company Davek claims to have made the “strongest, most high-quality umbrellas” and now it took to Kickstarter...
Selfie Mania Turning People Psychic-Reportedly, a Russian paramedic is fired for taking pictures with Dying patients. Paramedic staff is believed to be...
Facebook is in the news again but this time for all the wrong reasons. Reportedly, the social networking giant will be defending...
The number of annual security incidents caused by insider threats is increasing. InThe CERT Guide to Insider Threats, Capelli et al write,...
While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important,...
The killer USB Drive has been designed especially to burn laptops – So be careful while inserting someone’s USB on your laptop. Have you heard...
The Obama administration wants greater power to shut down botnets, responding to the growing threat of cybercrime and increasingly complex, modern techniques.
A British bank has been trialling a different type of biometrics, allowing their customers to confirm their identity via heartbeat according to...
Heimdal asked a range of security experts for their essential security tips. 19 experts (including David Harley) offered over 50 tips.
One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at...
One of London’s tube stations will become more accessible for vision impaired and blind travelers by an amazing new Bluetooth setup. According...
Using VPN is a crime under UAE’s cyber laws – Anyone found using VPN can be charged for going against the country’s...
The controversial cybersecurity legislation Cybersecurity Information Sharing Act (CISA) will be passed by the Senate Intelligence Committee on Thursday, said the panel’s...
It has been found that hackers can now easily abuse any website’s domain name based email addresses through the Google Apps for...
In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024