Modern cars are more and more dependent on computer systems. And guess what? They can be hacked.
The hacktivist group Anonymous has attacked the terrorist organization Islamic State (ISIS) on a large scale. ISIS has a very strong social...
IBM defines a data scientist as an individual evolved from the data analyst or business role. The person needs a solid foundation in...
Victims of the Anthem Inc health insurance hack are being bombarded with phishing scams including fraudulent emails and cold calls, reports Slashgear.
The British government has released a document outlining the rules that British spy and law enforcement agencies have to follow in their...
Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most...
Your internet-enabled Samsung Smart TV could be listening to everything you say, and sharing it with third parties.
It’s is an undeniable fact that different governments use hacking as a security and a way to keep an eye on its citizens...
As the launch dates of anticipated products approach, the leaked pictures and videos start pouring in. Samsung did an amazing job till now...
The world’s first Ubuntu phones have arrived and they are available online. Here I’ll be talking about the difference this Ubuntu phone brings to...
World’s First Ubuntu based Smartphone will go on sale for just €170 in Europe via BQ.com through a series of flash sales. Ubuntu announced...
This has not been a great week for Adobe; they have been scrambling to fix a number of critical vulnerabilities in their...
A new cybersecurity video from the Australian Cyber Security Centre (ACSC) has taken an unusual approach to raising awareness, playing dumb in...
The famous Bangladeshi hackers from 3xp1r3 Cyber Army are back in action. This time the hackers hacked and defaced the sub-domain of the...
Yesterday the Anthem breach, the biggest healthcare-related breach to date was announced, as attackers accessed a database containing the records of current...
On Thu, 02 Jan 2014, a Kurdish hacker going with the handle of Anonymous Kurdistan & Muhmad Emad hacked two Turkish government...
A survey of more than a million apps on the Google Play and iOS App Store has found that more than 40...
The CEO of WhatsApp, Jan Koum informed on January 21 that the very popular and well-known mobile application has a web client...
Anthem Inc. has suffered an attack on its database which is likely to be the biggest data breach ever disclosed by a...
A ransomware kind of threat has been on the loose that works by encrypting the data on the infected computer and then...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks