With the recent reports making media headlines about how the NSA and GCHQ have compromised millions of SIM keys manufactured by Gemalto,...
Kris Jenner is reportedly being blackmailed over a naked video that was stolen from her iCloud and could be released in the...
[Updated] A recent update in the instant messaging app WhatsApp has rolled out the WhatsApp voice calling feature to everyone. Now, Whatsapp...
Women Stalked by Security Guards via CCTV – “Sleaze File” contains images of pretty women Five security guards of a high-profile shopping complex...
The US surveillance agency, National Security Agency (NSA) along with its British counterpart the Government Communications (GCHQ) has compromised one of the...
Researcher dedicated to debunking hoaxes and exposing scams, have discovered a phishing scam doing rounds on the Facebook. It comes as a...
It is somewhat a proven fact that Computer & Internet have brought a new era of productivity into the human life in...
Firefox browser from Mozilla is one of the most popular web browsers available. It has a big user base and market share. Mozilla...
With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they...
About a month ago, to my embarrassment, I learned that my Wi-Fi password was so weak that even my 10 year old...
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused...
Lenovo has issued a public apology, admitting it "messed up badly" by selling laptops with a controversial tracking software pre-installed.
Short Bytes: People are often confused between two terms: hackers and cyber criminals. In this article, I’m sharing a video that tells...
Lenovo, the World’s largest PC maker, had pre-installed a virus-like software which makes the computer vulnerable to the hacking attacks. These laptops...
Hello Everyone, Yesterday I wrote about the what code should you learn in 2015?. Today I’m covering the trends of the top programming...
On Wednesday 17th Feb, 2015, a group of hacktivists calling themselves “The oppressed defenders” conducted a cyber attack on Saudi Arabian based bank AlJazira in...
Last month I felt the need to convert some image to editable text, so I searched the web and came across few...
Over 60% Dating Apps Detected Unsafe by IBM Security – Popular Dating Apps Making Users Vulnerable to a Variety of Cybercrimes. Mobile Dating...
Hackers have breached the billing and payment pages of BigFish Games and stolen sensitive information, according to the company’s notification letter published...
WWE superstar Antonio Cesaro was the victim of a Twitter hack this week, as a wrestling fanatic hacked his account to vent...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks