eBay Inc. (Nasdaq: EBAY) has confirmed yesterday on its blog that it experienced one of the biggest criminal cyberattacks ever and has...
The leader of a gang who attacked 24 websites in search of personally identifiable information – from the unlikely confines of an...
eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers,...
A Chicago artist has created a cheap, effective way for the public to fight back against the growing profusion of security cameras...
Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what's...
High-end Samsung phones could soon ship with a biometric scanner which puts fingerprint-swipe buttons (as seen in both Samsung and Apple’s flagship...
At the end of April Microsoft announced that a vulnerability in Word was actively being exploited. New variants of MiniDuke display interesting...
Necessity is the mother of invention, the old adage has proved its worth again when a group of Harvard and MIT students...
Google, Facebook, Twitter and AOL have joined forces to stamp out fake tech support services where customers are fooled into calling bogus...
Google is back in the news for all the wrong reasons! According to reports from BBC, a European Court of Justice ruled...
Many cybercriminals are not exactly Bond villain material - in fact, some are criminals with a level of weapons-grade stupidity that Bond...
Technology giants with large ad networks need to do more to protect consumers from hackers infiltrating their advertising networks to deliver malicious...
It’s one thing to bring your mind into virtual reality. Get some snazzy VR goggles in front of your eyes, bump the...
The FBI is gearing up for a major crackdown on cybercrime, and says that arrests of major criminals will follow in weeks....
So-called phone hacking makes the headlines again, as new revelations are made. Have you properly secured your mobile phone voicemail?
Phil Zimmermann invented the most widely used system of email encryption in the world - and says that Fortune 100 companies are...
The popular online wallet site Dogevault is offline after attackers destroyed data on the site. The impact on user funds is unknown...
You can also find the code for this project below: /* Brute forcing Android 4 Digit PIN's To run the whole range...
The photo-sharing app Snapchat, popular with youngsters for its photos which would exist briefly then “disappear forever” has admitted that the photos...
There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire,...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor