When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being...
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first - and for...
Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android...
Researchers warn that the highly popular mobile application WhatsApp cannot be trusted blindly. WhatsApp has been one of the most popular mobile...
A new feature introduced by Facebook to allow meeting the Facebook friends in real time when they are actually close by has...
A Pakistani hacker going with the handle of H4x0r10ux m1nd has hacked and defaced the official website of Bangalore City Police India, yesterday....
This tutorial mainly created for Linux fans. Follow the given steps below to install Kali Linux on your Android phone. Step 1:...
A new, terrifying weapon is in the hands of hackers - the ability to stop a toilet flush working. We look at...
Google’s popular Chromebook laptops could soon do away with passwords entirely with a new system where simply bringing a phone near the...
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal...
Hard drive specialist LaCie has admitted a data breach that exposed customer emails and passwords - and the attack went undetected for...
Google’s latest update on Monday only highlights how apathetic they are to the privacy of their users and consider every bit of...
A crude fake fingerprint molded using wood glue, and based on a photo taken by a smartphone was enough to fool the...
Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.
iBanking is a malicious Android application that when installed on a mobile phone is able to spy on its user’s communications. This...
Can't yet upgrade from XP? Recommendations are being made by Gartner and others for staying (relatively) safe.
The critical security vulnerability in OpenSSL known commonly as “Heartbleed” continues to raise alarms, with websites now warning that hackers have breached...
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it...
The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some...
Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers - victims...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks