Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German...
A new computer vision attack could allow Google Glass wearers to steal passwords typed in on nearby tablet or smartphones - even...
A leaked list of people who had enquired about the auction for bitcoins from the “dark market” Silk Road provided a target...
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light...
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous...
One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.
Top police cybercrime experts from 22 European countries are to participate in a 10-day intensive training course in Spain starting this week...
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even...
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years...
A new smartwatch, Fidelys, aims to bring a new level of biometric security to our lives with an ultra-secure infrared iris-scanning camera...
Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market...
A point-of-sale and security system vendor used by restaurants including Taco Bell and Dairy Queen has warned its customers that customer credit...
European privacy regulators have demanded an explanation from Facebook over its alleged “psychological experiment”, in which thousands of unknowing site users’ News...
Syrian Electronic Army has made a major comeback by hacking and defacing the official blog of Israel Defense Forces (IDF) yesterday. The high profile...
Eager Apple fans waiting for the latest update on the iPhone 6 launch and the rumored iWatch have been targeted with a...
The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or...
A Ukrainian criminal who claimed to be behind a plot to send packages of heroin purchased from an online ‘dark market’ to...
The US is still perceived as a hotspot for card fraud: what difference will the ongoing roll-out of Chip & Signature EMV...
Extorted for Bitcoin? Some U.S. pizza restaurant owners have been receiving letters threatening them with bad reviews, fake pizza orders, food contamination...
Handing out Wi-Fi passwords to Android L users just got easier, thanks to a secure NFC method of password sharing, meaning the...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft