A vulnerability in the official Twitter client Tweetdeck left users vulnerable to attack, forcing thousands of users to retweet cryptic lines of...
The Bank of England weathers an average of eight cyber attacks including malware-laced “spear phishing” campaigns per week, according to Chief Information...
With the World Cup in Brazil poised to begin, the whole world is watching - and that includes cybercriminals. Here's the latest...
A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from...
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and...
While surfing Facebook, you must have seen a blue badge indicating verified pages and profiles of famous people such as celebrities, journalists...
Your iPad or iPhone’s camera has become immensely powerful after the emergence of iOS 8 Safari’s new version. Its most astounding feature...
Do you know what ransomware is? Do you know a filecoder from a lockscreen? Read our FAQ to become more clued-up about...
Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code...
When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its...
On the one year anniversary of Edward Snowden's public revelations of mass surveillance conducted by the U.S. National Security Agency we look...
The hi-tech research wing of the US military DARPA (Defence Advanced Research Projects Agency) is to offer a $2 million prize offered...
In an embarrassing breach of security, the passport numbers of members of the England Football squad have been accidentally tweeted out by...
Last weekend saw the (somewhat anticipated) discovery of an interesting mobile trojan – the first spotting of a file-encrypting ransomware for Android...
Users of Windows XP are not upgrading to safer versions of the operating system after the April 8 deadline when Microsoft stopped...
Convincing-looking emails where the victim is directed to click on a Dropbox link to download a supposedly unpaid invoice (and other classic...
If you thought that Heartbleed is out of date now, and the whole cyber world is secure, then you have to change...
FBI names as "Most Wanted" the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and...
Oliver Stone is known for depicting famous [rather infamous] real life stories on screen. And the list of his highly successful real-life...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks