After taking quite a long break from comment moderation on the WeLiveSecurity blog, I’ve recently started receiving comment notifications and have therefore...
Keylogging tools to steal personal information from victims are available as a “service” from a site known as PrivateRecovery, which offers the...
Simply holding your phone a few inches from your PC to "hear" signals inaudible to humans will be enough to log in...
National Aeronautics and Space Administration (NASA) which is now more famous for its poor cyber security rather than any else is again under attack,...
In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network...
When Apple unveils its new iPhone models Tuesday, one particularly persistent rumor may come true - that at least one model of...
Four out of five consumers have been “locked out” of websites due to not remembering log-ins - and over a fifth rely...
Syrian Electronic Army, known as pro Bashar Ul Assad group has been labeled as a terrorist organization by U.S. Federal Bureau of...
A hacker going with the handle of Black Angels has hacked and defaced two official websites of Turkish government ministry of Food, Agriculture...
You can still browse anonymously on the internet and the perception that our emails are being spied is ”wrong”, says Fabio Coelho, Country...
As I have been reporting on different online ops against or pro to Syrian war, one team which is pro Syrian Electronic...
Baby monitors which shipped with security flaws that allowed hackers to watch and listen to babies from remote locations have led to...
Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United...
Internet users are becoming more savvy about keeping their private data safe - but many have already fallen victim to crime and...
BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify...
A hacker going with the handle of ‘Keo’ from Phenomenal Crew claims to breach into the official website of French-based automobile manufacturer...
A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United...
Performing a “cyber spring clean” can be time-consuming - but many of us have a few weaknesses we can tighten up in...
The Argentinian hackers from Team Hacker Argentino have hacked and defaced total 40 Chinese educational websites for #OpFreeSyria, an ongoing online operation...
A YouTube video has been circulating on the internet for last couple of days in which online hackavist group Anonymous has called...
Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
Hook: New Android Banking Trojan That Expands on ERMAC’s Legacy
DDoS 2.0: IoT Sparks New DDoS Alert
NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers
Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads
Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems
Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ Years
N-Able’s Take Control Agent Vulnerability Exposes Windows Systems to Privilege Escalation
How Cyberattacks Are Transforming Warfare
Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages
Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws
Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability
Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird
Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking Attack
Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper
Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks
Proton Mail vulnerabilities allow stealing decrypted emails and impersonate users
Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World