In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity...
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a...
The Killer USB USB drives are known be humble creatures that help you out by transferring your data. But, what if a...
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of...
A number of websites have been put at risk due to a very popular plugin of the WordPress content management platform vulnerability...
US Consumers looking for a wireless steal can now get encrypted free monthly phone service thanks to FreedomPop, the firm behind the...
Around 3,000 new security professionals will be added to the United States military’s infosec unit by 2016, according to reports. It says that...
Phone hacking ruined the lives of celebrities, and - in at least one case - almost drove a victim to suicide.
The online Turkish hacktivist group RedHack has hacked and defaced the official website of Istanbul Police Association in tribute to Berkin Elvan, a 15-year-old teenager who...
WordPress’s MainWP Child Plugin has vulnerability… and it is very much exploitable. Researchers at Sucuri have identified a vulnerability in the MainWP...
Even after almost a year, Facebook apparently has failed to fix a bug that lets attackers hijack accounts on sites that leverage...
A lawsuit has been filed against NSA (National Security Agency) to preserve the rights of the 500 million Wikipedia users who visit...
Around 80 percent of global merchants including retailers, financial institutions and hospitality firms have failed interim tests which show they are not...
Google has opened the registration for the 12th Annual Google Code Jam competition for programmers. To register yourself, click on the blue...
Sesame Enable is the world’s first touch-free smartphone that will allow users (especially disabled) to use without even using their finger. Just...
American journalist Glenn Greenwald who’s running The Intercept publication has shared more shocking documents obtained from the ex-NSA spy Edward Snowden. The latest revelation...
A number of states already have laws preventing the police from prying on your phone’s location history without a warrant, but they...
Ride-sharing taxi apps Uber, Lyft and Sidecar have been asked by US lawmakers to adopt fingerprint-based background checks for their drivers,
Italy’s security firm Hacking Team is providing Ethiopia with off-the-shelf spyware, and have been expanding their repressive reach far overseas in the...
The United States' military is looking to hire 3,000 cybersecurity professionals to man its infosec unit over the next nine months.
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment