Microsoft has revealed that Windows is vulnerable to a critical Freak SSl Flaw. Freak is a security bug that facilitates cybercriminals to conduct...
Tor users will now have to enter their phone number in order to make a new account on Twitter. Last week, Twitter...
In order make its product more helpful, Facebook updated its tool to report suicidal posts. Facebook claims that this tool will make it easy to...
uTorrent is one of the most popular torrent clients out there and a new update in the software has brought some unwanted...
Alian Philippon, a 38-year-old citizen from Ste-Anne-des-Plaines, Quebec, will be facing up to 24,000 Canadian Dollars fine and one-year jail time for...
The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed...
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one...
On Tuesday 3rd March, the official website of Colorado’s Larimer County Sheriff Office website (LCSO) was hacked by pro-Palestinian AnonGhost hacking group. Today, Thursday,...
Victims of iPhone theft being tricked into unlocking their devices – Criminals luring victims to Fake iCloud login via text messaging. Seems like...
Smartphones are seriously wonderful since these have introduced us to some amazing things like Snapchat, Vine, Maps, Shazam and some not-so-amazing stuff too...
Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach...
Here’s a small selection of alternatives to Bitcoin - each of which has its own advantages. All of them share Bitcoin’s fundamental...
The list of organizations mentoring this year’s GSoC- Google Summer of Code 2015 – has been released and this list is having...
The official website of Colorado’s Larimer County Sheriff’s Office ( LCSO) was hacked early Tuesday morning by famous hacking group AnonGhost. Officials running the website acknowledged the...
Signal 2.0, is the second installment of the app of the same name that was created for iOS. Its release has been...
Unsealed Document Exposes FBI – Bureau admits using Stingray Devices to Disrupt Phone Service. FBI’s Stingray secrecy has been compromised and exposed by...
The Defense Advanced Research Projects Agency (DARPA) is known for its secretive projects, but we have to agree the agency is also...
Fake Amazon gift cards are being sent to Android devices via text message, but it's malware not discounts that is being spread...
The latest round of phishing scam is associated with YouTube. A mail asking one to update YouTube account information is actually a...
A set of tools has been rolled out by Facebook to help prevent suicide thoughts among its users. It is now possible to...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment