Norway�s�top financial institutions came under massive cyber attacks on Tuesday.Anonymous Norway appears to be behind this attack. The attack�on Norway�s�top financial institutions/banks,...
Emails warning internet users that they have violated copyright and owe companies such as Sony and Paramount a cash settlement have been...
Nigeria’s notorious fraud industry has expanded overseas - with Nigerian conmen entering Malaysia on student visas to perpetrate fraud using the country’s...
How are YOU supposed to remove your house from Google Street View if you don't like the idea that Google drove one...
New ‘slimline’ ATM skimmers are proving far harder to spot - with some of the hi-tech models remaining in place for up...
Amazon�s new smartphone launch is all set to fire up the smartphone market and is likely to give a hard time to...
Internet surveillance by America's National Security Agency (NSA) has been further exposed by two new developments: the analysis of leaked NSA surveillance...
Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever...
Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German...
A new computer vision attack could allow Google Glass wearers to steal passwords typed in on nearby tablet or smartphones - even...
A leaked list of people who had enquired about the auction for bitcoins from the “dark market” Silk Road provided a target...
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light...
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous...
One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.
Top police cybercrime experts from 22 European countries are to participate in a 10-day intensive training course in Spain starting this week...
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even...
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years...
A new smartwatch, Fidelys, aims to bring a new level of biometric security to our lives with an ultra-secure infrared iris-scanning camera...
Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market...
A point-of-sale and security system vendor used by restaurants including Taco Bell and Dairy Queen has warned its customers that customer credit...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage