Email titled “My New Photo ;)” actually Contain Malware – A .Zip file has an attachment Supposedly containing the promised image. Summary: Hackers,...
According to a study by Alcatel-Lucent’s Motive Security Labs, users around the world are being spied upon by extremely sophisticated mobile malware...
Since the very first announcement of Windows 10 by Microsoft, phone users were eager to get their hands on the latest version...
The online Hacktivist group Anonymous has announced to expose the “elite” class pedophiles involved in or covering-up the child sex abuse, including the senior Westminster figures. The...
Can you decide what happens to your Profile Page after your Death? Facebook can! While rolling out its latest update on Thursday,...
Customers of Standard Chartered Bank, Pakistan were recently left stunned after they received transaction alerts via email and SMS. They were informed...
Researcher discovered a flaw that could help him Delete photos from Anyone’s account. To delete someone’s pictures from Facebook is certainly not...
That message you received from a sexy Russian lady calling you Mr Dependable? Sorry to burst your bubble, but it's too good...
The U.S. military installation, Area 51 located about 100 miles north of Las Vegas, is one of the most known secret and...
Everything formidable is often associated with its negative half and the same can be said of the internet. The origins of functional...
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by...
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Today Microsoft released the very first build of Windows 10 Technical preview for phones. Just like the other previews, it is incomplete...
An email, which appears to be sent from eBay, informs that due to the inaccuracy of your credit card information, your account...
Few weeks ago, an article was published in The New York Times. The article talked about a set of 36 questions and...
A project had been announced by the U.S government’s Defense Advance Research Projects Agency (DARPA) last year which was to create a...
Search-Lab Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is...
You can’t deny the fact that sometimes converting audio and video to some other format becomes one heck of a task. We...
DEA Maintaining Massive database of the country’s drivers and vehicles’ number plates – Database is used by DEA to track car owners. In...
Investors fear they may have lost up to $387 million after Bitcoin exchange MyCoin shut down this week, reports ZD Net.
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage