A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans...
Samsung's Galaxy S5 offers a cutting-edge component that will change m-commerce forever - a fingerprint-scanner which offers instant authentication with one finger-swipe...
Documents leaked by the ex-NSA contractor and the whistleblower, Edward Snowden, indicate GCHQ and NSA along with the US government were hand...
The official website belonging to the Ministry of Internal Affairs of Kuwait was hacked and defaced on 26th March, 2014 by unknown...
Microsoft has issued a warning about a possible hacking attempt through an RTF exploit code, according to its official blog. The latest...
A Pakistani hacker going with the handle Hasnain Haxor from Pakistan Haxor Crew has hacked and defaced the official website of Pakistani consulate in...
Spammers are taking advantage of the various online petitions against the recent news about the alleged arming of the Syrian rebels by...
The official Twitter account of Ecuadoran president Rafael Correa was hacked last Thursday with several anti-government tweets spammed over the social media. The hacked Twitter...
The pro-Palestinian hacktivist AnonGhost has hacked and defaced the official website of Israeli Agricultural Research Organization, which is ran by Israeli Ministry of...
Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from...
Will the future be a murderous game of 'smart device' Cluedo, where Colonel Mustard meets his death at the hands of a...
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which...
Anonymous threatens cyberattack on Albuquerque Police Department for shooting and killing mentally ill homeless man James M. Boyd. File photo of mentally ill...
A security firm has revealed that hackers are targeting companies utilizing services of Monster Jobs, a well-known job portal, through a new...
A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues - and even...
Famous South Korean Search Portal NAVER Hacked, 25 Million accounts Hacked Using Stolen Data. A hacker going with the handle of ‘Seo’...
Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support...
Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.
A possibility that Muslim hackers could have compromised the IsraelDefense magazine (www.israeldefense.com) database and its website, to launch the recent SMS attack on...
In an exclusive interview with NBC, the ex-American president Mr. Jimmy Carter expressed his views on the NSA; according to which Mr. Carter believes...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor