The FBI has issued a warning to police and other emergency response personnel about a lethal new tool which 'malicious actors' have...
A data breach of staggering proportions has hit South Korea - involving 27 million people and 220 million private records - all...
Concern is growing over the export of surveillance equipment which can track the movements of anyone carrying a cellphone. Such technnologies are...
Users witness looking at pictures of Russian car crash regardless of what they searched on Google Images. If someone searched for ‘cat’ the search result...
More than a thousand U.S. businesses have been affected by point-of-sale malware - malicious software written specifically for online fraud, to steal...
An image of a Russian car crash has piled up in Google Images - leading to speculation that the service has been...
2014 Emmy Awards were pretty much unsurprising and a lot of fan favorites won. NBC drama Breaking Bad won the Emmy Award for...
Sony’s PlayStation Network was back online and the information of its 53 million users safe, despite a weekend-long cyber attack, and a...
A new tactic where waves of Bitcoin wallet phishing emails are targeted at corporations has proved a success for the criminals behind...
There would have been many times when you wanted to download just the audio of a YouTube video, but not finding any...
Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for...
This week saw two of the scariest targets for hacks ever - nuclear plants and city-wide traffic systems. Tthe traffic-light hack could...
But some things on Facebook haven’t changed - namely, the scams. It’s not that cybercriminals are unoriginal - it’s just that there...
Security researchers from University of Michigan and the University of California Riverside Bourns College of Engineering have found out a security flaw...
If you ever get asked to fix the PC of a friend or colleague which has been having problems, the first thing...
‘Scareware’ - fake antivirus programs which attempt to fool the user into downloading malware, by warning him or her of a “threat”...
Classified documents relating to the missing Malaysian Airlines Flight MH370 were stolen using a carefully-crafted spear-phishing attack, targeting 30 government officials just...
Also Read: Download Kali 2.0 Now
The most famous traffic light ‘hack’ in history is in the classic film, The Italian Job (1969), where the heist involves paralyzing...
Police hope to work with leading mobile phone manufacturers such as Samsung to build in the requirement for a password or PIN...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files