Online criminals are spamming out messages claiming that invoices are overdue. But attached to the emails are .ARJ files containing a malicious...
Gnome is one of the most popular and most used desktop environment for Linux systems . It is a desktop environment which...
British internet users opening a spam email are three times more likely to be facing a malicious URL than users in the...
This week, American chain Home Depot admitted its systems had been breached, Gmail users got a fright, and a series of videos...
You can make your phone even more productive if you can connect them with your computer. Connecting them isn’t just about using...
A young man who got an email from Facebook ‘identifying’ him via Facebook tag in a series of photographs which turned out...
A strain of malware which previously targeted banks has turned its attention to users of the popular Customer Relationship Management (CRM) software...
Some five million people who used their Gmail address as a user name had their passwords published by someone who apparently thinks...
The sad truth is that scammers and fraudsters don't have any conscience, and are prepared to do anything if it might net...
Bitcoin’s mysterious creator, who goes by the pseudonym ‘Satoshi Nakamoto’, could be about to have his identity made public, after a series...
The blame game rages on in the wake of Celebgate and massive payment card hacks like Home Depot and Target, as though...
Anyone who has visited popular domains such as YouTube.com, Amazon.com or Ads.Yahoo.com could be a victim of a new, mutating malware attack...
You know the time when LCD, LED screens were not common and CRT monitors were mostly used for video output? it was...
Nearly a billion users of a dozen chat apps for Android including popular apps such as Instagram, Oovoo, OKCupid and Grindr could...
The world’s largest home improvement chain store, Home Depot, yesterday confirmed a data breach affecting credit cards and debit cards used in...
A new Harris survey found that almost all Americans care about online privacy, and 71% said that they ‘care deeply’ about it....
Google Chrome will now recommend pronounceable password hoices, according to developer and Chrome “happiness evangelist” Francois Beaufort, who announced the change via...
It’s time to say good bye to once the best instant messaging platform MSN Messenger (also known as Windows Live Messenger). Microsoft started shutting...
Cinnamon is a popular Linux desktop based on GTK+ that got its start as a fork of GNOME Shell . It is...
People handling hundreds of documents weekly as part of their personal or professional work know how it feels when their internet connection...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage