The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on...
The Secret app showcases startling confessions about what a person really thinks but isn’t willing to share on sites like Facebook Reports suggest Zuckerberg has had...
The Heartbleed bug – a flaw in an encryption technology used to protect major websites including Yahoo – has left a huge amount...
A new technique for spotting cyber attacks has been designed by a young American student - and could prevent attacks against planes...
Pamela [Win] It is free to download and allows you to record calls you make using Skype. It works on Windows devices...
Lost you android phone ..? Feeling to sad .. ? Dont worry Now we came with another Application which sorts out...
This patch Tuesday, April 8, 2014, sees the last updates to be released to the public for Windows XP and Office 2003....
Samsung is the most popular brand of smartphone among a large portion of the adult population - adulterers, with the Korean handsets...
Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable...
Year 2014 begin with a warning from online hacktivists Anonymous in which it warned Israel to get ready for a massive cyber...
It is us, the nerdy geeks who are into computers, who have a moral right to help the great unwashed, and lead...
Both were key players in exposing the US government surveillance program that has outraged the national and international communities alike. Laura Poitras...
A human right organization has challenged the setting up of the FinFisher surveillance technology in Pakistan, according to media reports. Bytes For...
The official website of terrorist organization Tehreek e Taliban Pakistan (TTP) (http://www.umarmedia.com/) has been targeted and successfully taken down by famous Indian hacker Godzilla. Godzilla hacker...
A competitor in an Australian triathlon was hospitalized with injuries and “pieces of propeller in her head” after a drone plunged from...
Armed with an impressive-looking shield logo, security app Virus Shield shot to the top of the sales charts on Android last week....
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge" - and one-fifth...
Most five year olds can write their own name - but few have a job title to put after it. A young...
We all know that sinking feeling when your computer decides to slow down and barely function for no real reason. Why is...
It's one thing to have a security hole that relies upon users visiting an infected website, or opening a dodgy attachment -...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment