Users of the online privacy service Tor - designed to allow users to access hidden sites anonymously - may have been unmasked...
The billions of USB ports in use in PCs are vulnerable to a new attack - which can undetectably install malware, steal...
A new Android flaw potentially affecting up to 80% of users could leave handsets vulnerable to rogue apps - leapfrogging the defenses...
For computer hackers, making the classic first-person shooter Doom play on odd devices is a quest that never ends - but an...
If intelligence and law enforcement agencies have a genuine need to spy upon some communications then it should not be via a...
A single email wiped $300 million off the value of an Australian mining company, after an environmental activist, Jonathan Moylan and sent...
Victims of the notorious attack against Sony’s online gaming service and associated websites in 2011, which exposed details for up to 77...
Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register's report - used to...
Ebay’s online ticket resale service Stubhub fell victim to a cyber-scam where a “global gang” used 1,600 hacked accounts on the service...
The developers of the Tor online privacy service are fixing a weakness which could have exposed the identities of hundreds of thousands...
Account hackers and thieves who loot magic weapons, armor and hard-won game currency from players in massively multiplayer titles such as World...
Tesla’s Model S has been hacked to make the doors and sun roof open while the car is in motion - and...
Given the 'nightmare' that is password management, is Microsoft right to say that it's sometimes OK to re-use the same memorable password...
Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically...
A new project aims to protect homes and small businesses from the security failings of Wi-Fi routers, a problem which has repeatedly...
Last time we wrote about Android/Simplocker – the first ransomware for Android that actually encrypts user files – we discussed different variants...
Over the past few years, Comic-Con has had over 130,000 attendees, and those attendees tend to be very digitally literate - so...
A new kind of web tracking tool bypasses the protections privacy-conscious web users rely on and is already being used to track...
‘Sextortion’ attacks where cybercriminals blackmail victims with the threat of exposing explicit photographs or messages are increasingly common, according to a report...
Disgruntled employees and other malicious insiders could be one of the most serious security threats companies face - but the importance of...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage