A new, terrifying weapon is in the hands of hackers - the ability to stop a toilet flush working. We look at...
Google’s popular Chromebook laptops could soon do away with passwords entirely with a new system where simply bringing a phone near the...
A 19-year-old teenager in London, Ontario, Canada has become the first criminal to be arrested for exploiting the ‘Heartbleed’ bug to steal...
Hard drive specialist LaCie has admitted a data breach that exposed customer emails and passwords - and the attack went undetected for...
Google’s latest update on Monday only highlights how apathetic they are to the privacy of their users and consider every bit of...
A crude fake fingerprint molded using wood glue, and based on a photo taken by a smartphone was enough to fool the...
Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.
iBanking is a malicious Android application that when installed on a mobile phone is able to spy on its user’s communications. This...
Can't yet upgrade from XP? Recommendations are being made by Gartner and others for staying (relatively) safe.
The critical security vulnerability in OpenSSL known commonly as “Heartbleed” continues to raise alarms, with websites now warning that hackers have breached...
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it...
The full scope of the Heartbleed bug came to light in a series of reports by researchers and white-hat hackers, with some...
Francois Gagnon is a Canadian business owner who was targeted because his company had lots of servers, and many customers - victims...
The most happening events in cyber world that makes every web savvy thrilled and compel to think ahead of cyber crime are...
The source of the bug, which has affected at least 500,000 sites and millions of users, was a small programming error made...
When parents post photographs and information about their children to social media, what are the privacy implications for those children when they're...
Google is to boost security on its Android devices, by continuously checking apps to see that they haven’t mutated into malicious Android...
There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read...
The password manager, LastPass, allows you to check if the saved sites are affected by the bug through its ‘LastPass Heratbleed Checker. LastPass’s Security...
The new bug allows attackers to gain sensitive information protected by the SSL/TLS encryption. A new exploit in the open SSL, the...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment