The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as...
Tor Browser app in the Apple app store is fake and have been found spreading adware and spywares. According to the official website...
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings...
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware...
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Boycott Israel through Smartphones, a higher level of anti-Israel campaign launched by pro-Palestinian activists from Boycott, Divestment and Sanctions movement (BDS). The Boycott...
Indian politicians have taken social media to its greatest height during the coming 16th Lok Sabha elections. A politician’s strength and mass following...
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn...
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign" details our analysis of a set...
More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a...
Apple’s Mac OS X Mavericks has some very neat privacy features built in - from a “Guest User” account which restricts people...
The official website of Regional Integrated Multi-Hazard Early Warning System for Africa and Asia (RIMES) has been hacked and defaced by Indonesian hacking...
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures...
The CIA and the US senate committee are at loggerheads, according to media reports on Tuesday. This meme describes the Hypocrisy at...
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer...
A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in...
The scammers take advantage of every incident to trick people and get some bucks or likes on social media. Same is going...
A group of Ukrainian hackers going with the handle of CyberBerkut has taken down the official website of North Atlantic Treaty Organization (NATO) along with...
Bad news for WhatsApp users on Android. If you chat on WhatsApp, it’s time to be careful and avoid getting too private. An...
Syrian Hackers have stated that they have compromised the central command of the US. Syrian Hackers Claim They’ve Compromised US Central Command...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets