When parents post photographs and information about their children to social media, what are the privacy implications for those children when they're...
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android...
There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read...
The password manager, LastPass, allows you to check if the saved sites are affected by the bug through its ‘LastPass Heratbleed Checker. LastPass’s Security...
The new bug allows attackers to gain sensitive information protected by the SSL/TLS encryption. A new exploit in the open SSL, the...
The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on...
The Secret app showcases startling confessions about what a person really thinks but isn’t willing to share on sites like Facebook Reports suggest Zuckerberg has had...
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount...
A new technique for spotting cyber attacks has been designed by a young American student - and could prevent attacks against planes...
Pamela [Win] It is free to download and allows you to record calls you make using Skype. It works on Windows devices...
Lost you android phone ..? Feeling to sad .. ? Dont worry Now we came with another Application which sorts out...
This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003....
Samsung is the most popular brand of smartphone among a large portion of the adult population - adulterers, with the Korean handsets...
Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable...
Year 2014 begin with a warning from online hacktivists Anonymous in which it warned Israel to get ready for a massive cyber...
It is us, the nerdy geeks who are into computers, who have a moral right to help the great unwashed, and lead...
Both were key players in exposing the US government surveillance program that has outraged the national and international communities alike. Laura Poitras...
A human right organization has challenged the setting up of the FinFisher surveillance technology in Pakistan, according to media reports. Bytes For...
The official website of terrorist organization Tehreek e Taliban Pakistan (TTP) (http://www.umarmedia.com/) has been targeted and successfully taken down by famous Indian hacker Godzilla. Godzilla hacker...
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams