Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around...
US energy, defense and educational institutions are the top targets of a possible sophisticated cyber attack from the Iranian hackers, says a...
When 'several thousand' payment terminals across the country stopped working last week, it would be easy to jump to the conclusion that...
Recent events have steered the national focus onto aggressive law enforcement and the public is not at ease with the situation. Physical...
Researchers from Blue Cat Labs are calling it the Inception attack framework, in reference to the movie “Inception” where a thief entered...
A pro-Palestinian hacker going with the handle of ‘AlFeRoX’ hacked and defaced the sub-domain of United Kingdom’s Department of Education in support of a...
Joseph Demarest, assistant director at the FBI, has been testifying on the threats of cybercrime to a Senate Committee on Banking, Housing...
Two-thirds of young people first learn about major news events via Facebook - but as cybercriminals cash in with hoax stories and...
Mobile payment platform Charge Anywhere has revealed an exploit in its software that means that five year's worth of credit card data...
Today Kate Beckinsale, Peter Krause, Paula Patton and Jeremy Piven announced the 2015 Golden Globes Nominations (Hollywood Foreign Press Association’s awards). These...
Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and...
The online hacktivist Anonymous has conducted a massive cyber attack on the official website of Oakland police, fire department and city website....
Blackphone - the Android smartphone that pushes privacy and security above all else - is to open an app store set to...
Nearly a quarter of digital advert impressions are faked, according to a new study. This advertising fraud is set to cost advertisers...
Social networks are fun, but can also spread misinformation and worse. We discuss myths about your contract with Facebook, and whether British...
A large number of companies are leaving their confidential files at risk by over-sharing with employees, according to a new survey by...
The clothing chain Bebe has been the latest company to suffer a breach of payment card information to hackers, reports PC World.
The identity of the Sony Pictures hackers who attacked last week remains a mystery, but we have an alleged location where the...
Tor has been used to mask the identities of cybercriminals in a significant number of bank frauds for over a decade, according...
For those of you who would like to code in their free time or just gain more knowledge in a preferred language...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files