As a result of Bilawal Bhutto’s tweet regarding Kashmir and growing tension between India and Pakistan on LoC and International Border, hackers...
The Curious Case of Brit Celeb Emma Watson’s leaked Facebook Video –Users Helplessly Welcomed Trojans instead of her Nude Pictures The scam of...
This week in security, we covered a full range of privacy and malware, with controversial plans to equip police officers with facial...
Dairy Queen has become the latest company to be hit by payment card stealing malware, reports the Wall Street Journal. The breach...
October is National Cyber Security Awareness Month in America and each year this program brings more and more attention to issues that...
Malware may begin to offer genuinely helpful functionality in the future, in order to "fly under the radar" and fake legitimacy before...
At least 50 cash machines in Eastern Europe have been targeted by malware that allows the hacker to withdraw up to 40...
For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a...
Mahendra Singh Dhoni is the only Indian in Forbes’ most valuable athlete brand list. He is ranked fifth after the likes of...
Since the BadUSB malware was released to the public with hopes of forcing a fix, a solution has emerged from the researchers...
For at least five years the Sednit group has been relentlessly attacking various institutions, most notably in Eastern Europe. The group used...
Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via...
Windows 10 Technical Preview (TP), a trial version released last week, collects and transmits lots of user data to Microsoft, according to...
The police force of Dubai will soon be equipped with crime-fighting face recognition technology via Google Glass, according to Reuters. The software,...
The son of American wrestler Hulk Hogan has been the latest celebrity to fall victim to theft and publication of naked pictures...
Romanian hackers used Bash Bug flaw to hackYahoo servers, according to a recent security news update. Jonathan Hall, President of the IT...
Techspot reports that a another USB exploit has been discovered by a pair of researchers who have "thrown caution to the wind...
Over the summer, Google introduced plans to start giving preference to websites that use HTTPS encryption to try and incentivize good online...
I came across this sub-genre of flash fiction about two years ago and I found it extremely captivating. According to the legend,...
This is a list of some weird cultural customs from all around the world. Take a look! 1) In India it is...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications