A bank is to allow remote log-ons using a hi-tech vein-scanning biometric system for large corporate accounts. The bank security system, using...
Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam...
LinkedIn may not have a spotless record when it comes to security and privacy, but we should give them credit when they...
Another major phone brand has added biometric security to a flagship smartphone as Huawei unveiled the ultra-thin Mate P7, complete with a...
A YouTube scam where users are threatened with suspension for an unspecified “violation” of the video site’s guidelines has been circulating via...
The government is to work with car manufacturers to prevent hackers using electronic means to break into increasingly hi-tech vehicles in Britain...
Shoppers at Home Depot stores may have had their credit card details leaked online, after a massive batch of card information went...
Hosting provider Namecheap said that it has come under attack from hackers apparently using the “Cybervor” hoard of 1.2 billion usernames and...
Have you wasted a lot of time in searching for a free software online? I know sometimes it can get very frustrating...
An unknown hacker has hacked and leaked nude pictures of 100+ high profile Hollywood celebrities on Sunday. The nude photos are available...
The online hacktivist Anonymous has announced to conduct a massive cyber attack on Pakistani government servers against yesterday’s police brutality on unarmed...
As many as 18 top cybercrime experts from around the world will form a new Joint Cybercrime Action Task Force based in...
A push-button function on many wireless routers designed to bypass the Wi-Fi password and provide quick access to the network could allow...
Hactivists have decided to play their role in on going political crisis, as a result the official portal of government of Pakistan...
You may not be knowing of URL shortening but I can bet you that you click on these links every time you...
The online hacktivist Anonymous has conducted as massive cyber attack on Pakistanigovernment, as a result Pakistani Army and government websites have been...
Gamers and cellphone users were targeted by criminal groups around the world this week - while retailers continued to suffer at the...
You are never truly invisible online - and even if you equip yourself with an arsenal of privacy tools, you'll still be...
Your home may be your castle, but on social networks, your friends are your perimeter. Will they enclose and protect your personal...
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage