An Iranian hacker group has been breaching computer networks of 50 of the world's biggest energy, transport and infrastructure groups for the...
Following the release of confidential documents and four unreleased films, as reported by We Live Security here, the bad news for Sony...
Dear readers, we are back with the Top Fossbytes – Top tech news of the Month. We have covered best stories from...
The recently released Brad Pitt film 'Fury' was amongst the titles leaked, but others were yet to be released formally be the...
The former head of the UK's government's communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored...
Police in the UK are facing an uphill struggle to deal with modern threats and cybercrime, reports the BBC, with the current...
2nd December is an important day for the Indian budget smartphone market. It marks the induction of two smartphones into the...
Last week’s hacking incident at Sony Pictures has led to leak of online release of many unreleased movies. These leaked movies include...
Thanksgiving Day phishing emails leverage this popular American holiday to target consumers who shop at The Home Depot and Costco. Here's what...
Rooting is the Android equivalent of jailbreaking, a means of unlocking the operating system so you can install unapproved (by Google) apps,...
Riot Games, the creator of League of Legends, has paid out over $100,000 to security researchers poring over the game looking for...
A Thanksgiving attack across many Western news and information websites left visitors facing javascript pop-ups telling them they had been hacked by...
Gamers have become major targets for hackers - from large-scale attacks against gaming companies, to small-scale scams carried out via game chat...
To this day, Friends is one of the best sitcoms ever to appear on television screens and many of you will agree with...
OnePlus is distributing special OnePlus One invites for its flagship device OnePlus One focused on India. OnePlus One will be available in...
Facebook has announced a set of new privacy focused terms of service, which aims to let users of the social network ‘control...
The Australian government is to conduct its first review into the country's cyber security since 2008, ABC Australia reports.
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the...
Today, I was talking to some friends about the Candy Crush notifications and I found out that everyone is sick of the...
Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment