Video games have gone since the late 1970s and early 1980s from being a small offshoot of the "traditional" computing industry to...
Blackphone, billed as a privacy tool to keep the puplic safe ruled the headlines when it was is hacked in five minutes,...
Sick-hearted scammers have proven themselves to have no morals once again, exploiting the death of Robin Williams with their latest Facebook scam.
There may be red faces in Red Square, after Russian prime minister Dmitry Medvedev had his Twitter account hacked.
Biometrics are touted as a replacement for the passwords and PINs we all know and hate - and Intel’s new earbuds could...
The gaming industry keeps growing, and the crowds at Cologne's Gamescom 2014, show why big game titles are rapidly becoming a target...
A new telephone scam in upscale restaurants in London, has “convincing” scammers calling restaurant staff and tricking them into believing there's a...
Two researchers have launched a petition to change how car companies and technology cmpanies work together - with a new villain: in-car...
The Target breach caused real damage to millions of American card users - but big financial institutions are doing little to remedy...
Can you tell the difference between exɑmple and example? Google adds non-Latin support to Gmail, and we explain why characters matter when...
Researchers flexed their hacking muscles at DefCon 22 to hunt the technology world’s most defenceless beasts - routers. More than a dozen...
An ultra-secure phone claimed to be the first privacy-focused smartphone on sale swiftly fell victim to a security researcher - who hacked...
One of the most important pieces of advice we give Android users is to refrain from downloading applications from dubious sources and...
The hacktivist group Anonymous is set to launch a massive cyber attack on Ferguson Police Department against shooting and killing of an unarmed...
Facebook's new Messenger app has spared privacy concerns after a list of Permisssions appears to show the app could be taking video...
An aircraft security expert has eased the worries of a lot of frequent flyers this week -- by reassuring them that aircraft...
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week - but revelations...
Yet another “connected” device was outed as a potential spy this week - as researchers showed how Google’s Nest thermostat could be...
The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically,...
Today’s fashion for high-end electronics in luxury hotels allowed a hacker to wreak havoc in 200 suites at once in a five-star...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft