When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its...
On the one year anniversary of Edward Snowden's public revelations of mass surveillance conducted by the U.S. National Security Agency we look...
The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered...
In an embarrassing breach of security, the passport numbers of members of the England Football squad have been accidentally tweeted out by...
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android...
Users of Windows XP are not upgrading to safer versions of the operating system after the April 8 deadline when Microsoft stopped...
Convincing-looking emails where the victim is directed to click on a Dropbox link to download a supposedly unpaid invoice (and other classic...
If you thought that Heartbleed is out of date now, and the whole cyber world is secure, then you have to change...
FBI names as "Most Wanted" the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and...
Oliver Stone is known for depicting famous [rather infamous] real life stories on screen. And the list of his highly successful real-life...
It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into...
In an exclusive report, we are updating that the official verified Facebook fan page of famous rock band Linkin Park (LP) with...
The famous Turkish Anonymous hacktivist group RedHack has hacked and defaced the official website of Ankara Chamber of Industry ASO, Turkey website (www.aso.org.tr). According...
The National Security Agency (NSA) collects millions of facial images transmitted through the Internet and uses them for various facial recognition programs,...
No one is too surprised to meet robots on the International Space Station - its Robonaut has posed for dozens of photos...
In Ubisoft's Watch Dogs, a man out for vengeance chooses an odd weapon - a smartphone. Loaded with deadly apps, he blows...
Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for...
Ex-employees often still have full access to the network of their previous employer, leaving the company open to “revenge attacks” - or...
Music streaming service Spotify has urged its Android users to upgrade to a new version of the app after “unauthorized access to...
Pirates who have downloaded one of the most popular torrent files of this week's big game release Watch Dogs - ironically, themed...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw