The sad truth is that scammers and fraudsters don't have any conscience, and are prepared to do anything if it might net...
Bitcoin’s mysterious creator, who goes by the pseudonym ‘Satoshi Nakamoto’, could be about to have his identity made public, after a series...
The blame game rages on in the wake of Celebgate and massive payment card hacks like Home Depot and Target, as though...
Anyone who has visited popular domains such as YouTube.com, Amazon.com or Ads.Yahoo.com could be a victim of a new, mutating malware attack...
You know the time when LCD, LED screens were not common and CRT monitors were mostly used for video output? it was...
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could...
The world’s largest home improvement chain store, Home Depot, yesterday confirmed a data breach affecting credit cards and debit cards used in...
A new Harris survey found that almost all Americans care about online privacy, and 71% said that they ‘care deeply’ about it....
Google Chrome will now recommend pronounceable password hoices, according to developer and Chrome “happiness evangelist” Francois Beaufort, who announced the change via...
It’s time to say good bye to once the best instant messaging platform MSN Messenger (also known as Windows Live Messenger). Microsoft started shutting...
Cinnamon is a popular Linux desktop based on GTK+ that got its start as a fork of GNOME Shell . It is...
People handling hundreds of documents weekly as part of their personal or professional work know how it feels when their internet connection...
A bank is to allow remote log-ons using a hi-tech vein-scanning biometric system for large corporate accounts. The bank security system, using...
Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam...
LinkedIn may not have a spotless record when it comes to security and privacy, but we should give them credit when they...
Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a...
A YouTube scam where users are threatened with suspension for an unspecified “violation” of the video site’s guidelines has been circulating via...
The government is to work with car manufacturers to prevent hackers using electronic means to break into increasingly hi-tech vehicles in Britain...
Shoppers at Home Depot stores may have had their credit card details leaked online, after a massive batch of card information went...
Hosting provider Namecheap said that it has come under attack from hackers apparently using the “Cybervor” hoard of 1.2 billion usernames and...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft