Dear readers, it is hard to keep track of everything happening around you in tech, science, business and gaming world. So we...
JP Morgan Chase, one of the largest banks in America has admitted that a JP Morgan Chase data breach has affected 76...
A new gadget from British drive maker Secure Drives forges off into Mission Impossible territory with a genuine, physical 'self-destruct' command which...
Google is facing a threat of expensive legal action over the recent leaked naked celebrity photographs, according to IT Pro. The basis...
More about the support scammer trend towards finding victims in Spain who aren't fluent English speakers.
Basic phishing attacks and easily available tools are all that is needed to compromise many industrial control systems, the head of cybersecurity...
Many New Yorkers don’t place a particularly high value on their private data - from fingerprints to social security numbers - having...
The FBI has opened up its previously in-house malware analyzing tool to the public in order to crowdsource more samples for speedier...
In a bid to improve the security of its Chrome browser, Google has announced that it is upping the ‘bounty’ paid to...
The Federal Bureau of Investigation (FBI) is not happy with Apple and Google for including encryption on their smartphone products, the agency’s director said Thursday....
Concerns over Snapchat privacy rocketed this week after users were bombarded with spam messages written in a style which suggests that a...
Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for...
The creator of an app that secretly allows you to monitor another person’s smartphone usage without their knowledge has been arrested in...
With Apple, Google and other tech companies responding to users’ demands for privacy with further smartphone encryption options, not everyone is happy....
An update on support scams: but are the scammers looking for fresh fields and posturings new?
Yesterday my friend reminded me that September 30th is Orkut‘s last day. It took me back in time when I stopped using...
Newly weds George Clooney and Amal Alamuddin supplied guests with "burner phones" to prevent photographs from falling into the hands of hackers...
Each time we look at the sky we get amazed by its brilliance and vastness . Whenever I need to spend some...
The pro-democracy protesters in Hong Kong have been targeted with an Android spyware disguised as an #OccupyCentral app, according to a team of security...
Remember when Apple’s iPhone 5S fingerprint sensor or in other words TouchID was hacked? Well history is repeating itself because the Apple...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications