The recently released Brad Pitt film 'Fury' was amongst the titles leaked, but others were yet to be released formally be the...
The former head of the UK's government's communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored...
Police in the UK are facing an uphill struggle to deal with modern threats and cybercrime, reports the BBC, with the current...
2nd December is an important day for the Indian budget smartphone market. It marks the induction of two smartphones into the...
Last week’s hacking incident at Sony Pictures has led to leak of online release of many unreleased movies. These leaked movies include...
Thanksgiving Day phishing emails leverage this popular American holiday to target consumers who shop at The Home Depot and Costco. Here's what...
Rooting is the Android equivalent of jailbreaking, a means of unlocking the operating system so you can install unapproved (by Google) apps,...
Riot Games, the creator of League of Legends, has paid out over $100,000 to security researchers poring over the game looking for...
A Thanksgiving attack across many Western news and information websites left visitors facing javascript pop-ups telling them they had been hacked by...
Gamers have become major targets for hackers - from large-scale attacks against gaming companies, to small-scale scams carried out via game chat...
To this day, Friends is one of the best sitcoms ever to appear on television screens and many of you will agree with...
OnePlus is distributing special OnePlus One invites for its flagship device OnePlus One focused on India. OnePlus One will be available in...
Facebook has announced a set of new privacy focused terms of service, which aims to let users of the social network ‘control...
The Australian government is to conduct its first review into the country's cyber security since 2008, ABC Australia reports.
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the...
Today, I was talking to some friends about the Candy Crush notifications and I found out that everyone is sick of the...
Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or...
The infamous anonymity of Bitcoin as a currency has a weakness built into it, according to a paper published by the University...
Google has launched a couple of new security feature for user of its apps. Most strikingly, the Devices and Activity dashboard allows...
The hacktivist group Anonymous has taken down the official website of City of Cleveland – Ohio, against the shooting and killing of...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw