Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market...
A point-of-sale and security system vendor used by restaurants including Taco Bell and Dairy Queen has warned its customers that customer credit...
European privacy regulators have demanded an explanation from Facebook over its alleged “psychological experiment”, in which thousands of unknowing site users’ News...
Syrian Electronic Army has made a major comeback by hacking and defacing the official blog of Israel Defense Forces (IDF) yesterday. The high profile...
Eager Apple fans waiting for the latest update on the iPhone 6 launch and the rumored iWatch have been targeted with a...
The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or...
A Ukrainian criminal who claimed to be behind a plot to send packages of heroin purchased from an online ‘dark market’ to...
The US is still perceived as a hotspot for card fraud: what difference will the ongoing roll-out of Chip & Signature EMV...
Extorted for Bitcoin? Some U.S. pizza restaurant owners have been receiving letters threatening them with bad reviews, fake pizza orders, food contamination...
Handing out Wi-Fi passwords to Android L users just got easier, thanks to a secure NFC method of password sharing, meaning the...
A hack shown off by Dutch security researchers allows an attacker to ‘take over’ Google’s new Glass headset, and send pictures and...
A flaw in PayPal’s two-factor authentication could allow attackers to gain access to up to 143 million PayPal accounts. The vulnerability affected...
On 26 June, the day of Armed Forces of Azerbaijan -, Azerbaijani hackers from Anti-Armenian Team hacked and defaced the official website of...
Google’s upcoming Android L update will do away with passwords - at least for dedicated Google fans, with Google devices such as...
/** * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC * * Vitaly Nikolenko * http://hashcrack.org * * Usage: ./poc [file_path] * *...
Personal information on 1.3 million people including bank details, medical records and home addresses may have leaked after a security incident where...
The Wi-Fi network name and password for the security center at the World Cup were accidentally leaked online by a newspaper, and...
Dozens of car washes across Connecticut have leaked “countless” credit and debit card details to cybercriminals, according to a new investigation by...
Google’s Nest thermostat can be hacked in under a minute, according to a blog post and video posted by GTV Hacker. The...
ESET LiveGrid® telemetry has indicated several new infection vectors used by Android/Simplocker. The “typical” ones revolve around internet porn, or popular games...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor