The official website of terrorist organization Tehreek e Taliban Pakistan (TTP) (http://www.umarmedia.com/) has been targeted and successfully taken down by famous Indian hacker Godzilla. Godzilla hacker...
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from...
Armed with an impressive-looking shield logo, security app Virus Shield shot to the top of the sales charts on Android last week....
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge" - and one-fifth...
Most five year olds can write their own name - but few have a job title to put after it. A young...
We all know that sinking feeling when your computer decides to slow down and barely function for no real reason. Why is...
It's one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment -...
One of the top intelligence officials in the Obama administration has confirmed National Security Agency (NSA) spying on the Americans’ communication using...
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards…...
Apps designed to ‘report’ on handset users’ communications while remaining undetected have increasingly become a factor in cases of domestic violence and...
Malware written specifically for DVR recorders used for the output of surveillance cameras has forced some machines to mine Bitcoin - although...
A couple in Southern German Town has been banned from naming their child ‘’WikiLeaks’’, claiming that it may put baby’s life in...
If computers continue to run Windows XP, and don't receive any more security patches. they are not just putting themselves and the...
An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords - and what appears to be email...
Mobile applications collecting personal data of users in one form or the other is no more a stunning news. The Snowden documents...
On 31st March, 2014, a hacker going with the handle of ”YMH” hacked and defaced the official website of Egyptian Armed Forces Training Authority....
DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes...
A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans...
Samsung's Galaxy S5 offers a cutting-edge component that will change m-commerce forever - a fingerprint-scanner which offers instant authentication with one finger-swipe...
Documents leaked by the ex-NSA contractor and the whistleblower, Edward Snowden, indicate GCHQ and NSA along with the US government were hand...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks