A notorious strain of banking malware, known as Caphaw - or Shylock, due to snippets of Shakespeare’s Merchant of Venice embedded in...
Files sent as a link from Google Drive could have shared more than their senders intended, Google admitted this week - in...
Norway�s�top financial institutions came under massive cyber attacks on Tuesday.Anonymous Norway appears to be behind this attack. The attack�on Norway�s�top financial institutions/banks,...
Emails warning internet users that they have violated copyright and owe companies such as Sony and Paramount a cash settlement have been...
Nigeria’s notorious fraud industry has expanded overseas - with Nigerian conmen entering Malaysia on student visas to perpetrate fraud using the country’s...
How are YOU supposed to remove your house from Google Street View if you don't like the idea that Google drove one...
New ‘slimline’ ATM skimmers are proving far harder to spot - with some of the hi-tech models remaining in place for up...
Amazon�s new smartphone launch is all set to fire up the smartphone market and is likely to give a hard time to...
Internet surveillance by America's National Security Agency (NSA) has been further exposed by two new developments: the analysis of leaked NSA surveillance...
Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever...
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German...
A new computer vision attack could allow Google Glass wearers to steal passwords typed in on nearby tablet or smartphones - even...
A leaked list of people who had enquired about the auction for bitcoins from the “dark market” Silk Road provided a target...
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light...
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous...
One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.
Top police cybercrime experts from 22 European countries are to participate in a 10-day intensive training course in Spain starting this week...
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even...
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years...
A new smartwatch, Fidelys, aims to bring a new level of biometric security to our lives with an ultra-secure infrared iris-scanning camera...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor