Syrian Electronic Army has made a major comeback by hacking and defacing the official blog of Israel Defense Forces (IDF) yesterday. The high profile...
Eager Apple fans waiting for the latest update on the iPhone 6 launch and the rumored iWatch have been targeted with a...
The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or...
A Ukrainian criminal who claimed to be behind a plot to send packages of heroin purchased from an online ‘dark market’ to...
The US is still perceived as a hotspot for card fraud: what difference will the ongoing roll-out of Chip & Signature EMV...
Extorted for Bitcoin? Some U.S. pizza restaurant owners have been receiving letters threatening them with bad reviews, fake pizza orders, food contamination...
Handing out Wi-Fi passwords to Android L users just got easier, thanks to a secure NFC method of password sharing, meaning the...
A hack shown off by Dutch security researchers allows an attacker to ‘take over’ Google’s new Glass headset, and send pictures and...
A flaw in PayPal’s two-factor authentication could allow attackers to gain access to up to 143 million PayPal accounts. The vulnerability affected...
On 26 June, the day of Armed Forces of Azerbaijan -, Azerbaijani hackers from Anti-Armenian Team hacked and defaced the official website of...
Google’s upcoming Android L update will do away with passwords - at least for dedicated Google fans, with Google devices such as...
/** * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC * * Vitaly Nikolenko * http://hashcrack.org * * Usage: ./poc [file_path] * *...
Personal information on 1.3 million people including bank details, medical records and home addresses may have leaked after a security incident where...
The Wi-Fi network name and password for the security center at the World Cup were accidentally leaked online by a newspaper, and...
Dozens of car washes across Connecticut have leaked “countless” credit and debit card details to cybercriminals, according to a new investigation by...
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The...
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games...
Usually we see cyber attacks, hacking and warnings from online hacktivists Anonymousbut a song? Well here’s what happened. Micheal Jackson’s famous hit...
Scammers and fraudsters think nothing of scraping the barrel of taste, if they believe it will help them earn a few dollars.
German Humanist Union, an independent civil liberties organization, has awarded Snowdenwith the Fritz Bauer Prize for exposing NSA’s controversial surveillance practices. The...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files