Nearly all Android smartphones contain bugs which can allow rogue apps to ignore the Permissions used to control them, according to German...
A new computer vision attack could allow Google Glass wearers to steal passwords typed in on nearby tablet or smartphones - even...
A leaked list of people who had enquired about the auction for bitcoins from the “dark market” Silk Road provided a target...
A high-profile ‘connected’ lighting system had a critical vulnerability which allowed attackers to take control of the entire system, switching off light...
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous...
One of the support scam sites used to mislead victims may be down, but the scam definitely isn’t about to go away.
Top police cybercrime experts from 22 European countries are to participate in a 10-day intensive training course in Spain starting this week...
A feature in newer Android phones puts users' privacy at risk - effectively broadcasting an accurate location history over the air even...
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years...
A new smartwatch, Fidelys, aims to bring a new level of biometric security to our lives with an ultra-secure infrared iris-scanning camera...
Every educational institution should be aware that cyber criminals make money by stealing personal information and selling it on the black market...
A point-of-sale and security system vendor used by restaurants including Taco Bell and Dairy Queen has warned its customers that customer credit...
European privacy regulators have demanded an explanation from Facebook over its alleged “psychological experiment”, in which thousands of unknowing site users’ News...
Syrian Electronic Army has made a major comeback by hacking and defacing the official blog of Israel Defense Forces (IDF) yesterday. The high profile...
Eager Apple fans waiting for the latest update on the iPhone 6 launch and the rumored iWatch have been targeted with a...
The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or...
A Ukrainian criminal who claimed to be behind a plot to send packages of heroin purchased from an online ‘dark market’ to...
The US is still perceived as a hotspot for card fraud: what difference will the ongoing roll-out of Chip & Signature EMV...
Extorted for Bitcoin? Some U.S. pizza restaurant owners have been receiving letters threatening them with bad reviews, fake pizza orders, food contamination...
Handing out Wi-Fi passwords to Android L users just got easier, thanks to a secure NFC method of password sharing, meaning the...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment