Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives...
A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.
Gamers using Raptr and AMD Gaming Evolved chat services should change their login details immediately, following a breach that could give hackers...
Image: Phandroid Generally the mischievous applications on the Android store Google Play don’t last long due to Google’s security measures or...
Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about...
It has been found by researchers that a hacking operation has been conducted targeting military intelligence so as to collect it for...
Adobe Flash Player has again seen a zero-day exploit that has appeared in the field due to a critical vulnerability that enables...
Home monitoring devices are the hot topic recently no matter it is crowd funding website, geeky technology website, or technology news website...
Senate Bill 13 targets Anonymous and its Guy Fawkes masks, according to members of Anonymous, a hacker collective. The bill by Sen....
President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.
A Russian dating website that had 20 million email addresses stolen last week, has paid the hackers not to sell the information,...
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
Use HipChat? Be aware that hackers have accessed the names, usernames, email addresses and encrypted passwords for some users.
Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up...
A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users...
Facebook appears to be infected with a porn-based malware that has affected about 110,000 Facebook users in just two days. The malware,...
One of the most popular online gaming profile trackers Raptr has been hacked and its users are pressed to change their user...
A developer claims that the newly launched Outlook app for iOS breaks your companies security for mobile PIM access on many levels....
For those who do not know much about Siri, Siri is a voice based application which was designed by Apple. It is...
Uploading Photos on WhatsApp Web Risky as Privacy Lapses Discovered: WhatsApp Web: WhatsApp Web is a new service launched by WhatsApp. It...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks