Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring...
Summary: On Nov 14, 2014, the online hacktivist Anonymous released a YouTube video announcing a cyber attack on Ku Klux Klan, (a...
WhatsApp has made its new option ”blue ticks” an indication that a WhatsApp message has been read. The feature, introduced just a...
For ordinary laptop and smartphone users, Wi-Fi is not ideal - but it’s sometimes near-inescapable.
The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own...
MasterCard and VISA have revealed their plan to end the use of passwords for online payments, reports The Telegraph.
ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if...
Microsoft has released an emergency update on Tuesday to patch a security flaw in the Windows operating system (that remained unnoticed for 19...
The BadUSB malware which potentially turns any USB stick into a 'unpatchable' malware carrier doesn't quite have the potential for mayhem it...
Want to know who visits your FB profile? This works 100% , as you are examining your own FB source code. Follow...
Following last month's leak of 13gb worth of private Snapchat videos, the vanishing message service has announced a new policy whereby it...
As we've reported before, users and businesses leaving their router username and passwords as the manufacturer's default are potentially leaving themselves open...
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years....
A new wristband that aims to replace the password has launched a crowdfunding campaign on Kickstarter. At the time of writing, Everykey...
Google has teamed up with the University of California in San Diego to publish surprising new research about phishing, how effective it...
Security cameras with default passwords are a threat to your privacy — A site has indexed 73,011 unsecured cameras in 256 countries around...
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom...
A year ago, Silk Road 2 appeared on the dark web, after the original Silk Road site's illegal drug trade was shut...
Apple is usually known for its top notch security but a US-based cyber security software developer Palo Alto Networks discovered a new...
If you use Gmail as your ‘main’ email account - or rely on Google services such as Drive for work - it’s...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage