A recent report given by the Daily Mail has revealed that due to the privacy issues, Facebook users are leaving the social...
Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying...
A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac...
Ever thought to buy an iPhone or a Play Station for free? well you could but its too late now, as an...
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president...
Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already...
Iranians were surprised to see Social media websites working inside the country without using any proxy server or virtual private network (VPN)...
As I had reported earlier how Bangladesh Black HAT Hackers (BBHH) have started cyber war against Indian cyber space by hacking 90 Indian...
Last week the FBI had arrested an alleged hacker who they claim is a member of online hacktivist Anonymous group and took...
Brazilian President Dilma Rousseff has decided to cancel her visit to the U.S. scheduled for October 23 against the NSA’s spying over...
A hacked card reader - similar to the ones used in shops and restaurants - is on sale on Russian forums for...
“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of...
Nina Davuluri is a 24 year old Indian descent born in Syracuse, New. The first woman of Indian descent to be crowned...
The official website of Pakistan International Airlines (PIA) () has been hacked and defaced by a Pakistani hacker going with the handle...
A Sudanese hacker going with the handle of Al Max Hacker has hacked a high profile official website of V. O. Chidambaram...
With malicious remote access attacks of the rise it is time to check your computer's RDP configuration and apply restrictions, like turning...
A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University - and even prevent...
Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods...
A Bangladeshi hacker going with the handle of ExpirED BraiN from 3xp1r3 Cyber Army has hacked and defaced 30 pornography websites, deleting...
A group of twelve hackers have been arrested by the police for hacking into the computers of Santander bank branch in London...
Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
Hook: New Android Banking Trojan That Expands on ERMAC’s Legacy
DDoS 2.0: IoT Sparks New DDoS Alert
NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers
Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads
Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems
Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ Years
N-Able’s Take Control Agent Vulnerability Exposes Windows Systems to Privilege Escalation
How Cyberattacks Are Transforming Warfare
Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages
Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws
Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird
Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking Attack
Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper
Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks
Proton Mail vulnerabilities allow stealing decrypted emails and impersonate users
Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World