uTorrent is secretly installing Epic Scale Bitcoin Mining Software on users’ computer to get some bucks – They claim it’s a distributed computing platform, but that’s not...
According to the UK authorities, 56 hackers have been arrested across England, Wales and Scotland with accusations of carrying out anti-cybercrime operations....
Microsoft has revealed that Windows is vulnerable to a critical Freak SSl Flaw. Freak is a security bug that facilitates cybercriminals to conduct...
Tor users will now have to enter their phone number in order to make a new account on Twitter. Last week, Twitter...
In order make its product more helpful, Facebook updated its tool to report suicidal posts. Facebook claims that this tool will make it easy to...
uTorrent is one of the most popular torrent clients out there and a new update in the software has brought some unwanted...
Alian Philippon, a 38-year-old citizen from Ste-Anne-des-Plaines, Quebec, will be facing up to 24,000 Canadian Dollars fine and one-year jail time for...
The Federal Aviation Administration must tighten the security around air traffic control in the United States, according to a new report filed...
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one...
On Tuesday 3rd March, the official website of Colorado’s Larimer County Sheriff Office website (LCSO) was hacked by pro-Palestinian AnonGhost hacking group. Today, Thursday,...
Victims of iPhone theft being tricked into unlocking their devices – Criminals luring victims to Fake iCloud login via text messaging. Seems like...
Smartphones are seriously wonderful since these have introduced us to some amazing things like Snapchat, Vine, Maps, Shazam and some not-so-amazing stuff too...
Anthem Inc. has refused to allow a federal watchdog to conduct an audit of its IT systems, following a huge data breach...
Here’s a small selection of alternatives to Bitcoin - each of which has its own advantages. All of them share Bitcoin’s fundamental...
The list of organizations mentoring this year’s GSoC- Google Summer of Code 2015 – has been released and this list is having...
The official website of Colorado’s Larimer County Sheriff’s Office ( LCSO) was hacked early Tuesday morning by famous hacking group AnonGhost. Officials running the website acknowledged the...
Signal 2.0, is the second installment of the app of the same name that was created for iOS. Its release has been...
Unsealed Document Exposes FBI – Bureau admits using Stingray Devices to Disrupt Phone Service. FBI’s Stingray secrecy has been compromised and exposed by...
The Defense Advanced Research Projects Agency (DARPA) is known for its secretive projects, but we have to agree the agency is also...
Fake Amazon gift cards are being sent to Android devices via text message, but it's malware not discounts that is being spread...
Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.
Beyond Threat Detection – A Race to Digital Security
Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting
CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw
Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors
RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability
Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware
U.S. Dismantles World’s Largest 911 S5 Botnet with 19 Million Infected Devices
Cybercriminals Abuse Stack Overflow to Promote Malicious Python Package
Check Point Warns of Zero-Day Attacks on its VPN Gateway Products
Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha
New Research Warns About Weak Offboarding Management and Insider Risks
Microsoft Uncovers ‘Moonstone Sleet’ — New North Korean Hacker Group
Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique
WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites
TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks
Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud
Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
Beware: These Fake Antivirus Sites Spreading Android and Windows Malware