With the first half of the year almost over, it's time for the ESET 2014 Mid-Year Threat Review. Presented as a webinar,...
Ancestry.com has become the latest site to be taken down by a distributed denial-of-service (DDOS) attack. The genealogy website was shut down...
Nokia paid several million euros to criminals who threatened to reveal the source code for part of its smartphone operating system seven...
A hacker has reportedly harvested over $600,000 in digital currency, using a network of hijacked machines, in what is believed to be...
A dangerous new strain of malware has been discovered, able to steal banking credentials without alerting users to the interception.
Note-taking and archiving app Evernote has announced that its discussion forum has been hacked, compromising some users’ passwords, dates of birth and...
Anonymous has fulfilled its promise of conducting cyber attacks on the government of Brazil during the football World Cup. Anonymous has come up...
A group of hackers claim to have stolen the personal details of some 650,000 pizza lovers, and have threatened to release them...
Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and...
A group of hackers going with the handle of Rex Mundi breached into the database of Domino�s Pizza websites in France and...
The top three teams from the fifth annual Mayors' Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North...
Graduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the...
Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants,...
A vulnerability in the official Twitter client Tweetdeck left users vulnerable to attack, forcing thousands of users to retweet cryptic lines of...
The Bank of England weathers an average of eight cyber attacks including malware-laced “spear phishing” campaigns per week, according to Chief Information...
With the World Cup in Brazil poised to begin, the whole world is watching - and that includes cybercriminals. Here's the latest...
A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.
In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from...
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and...
While surfing Facebook, you must have seen a blue badge indicating verified pages and profiles of famous people such as celebrities, journalists...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment