Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access...
The list of secrets held by the NSA is a never-ending one. Latest in the list includes its refusal to disclose the amount...
The malware problem on Mac OS X is nothing like as bad as it is on Windows, but that doesn't mean it...
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all...
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS -...
The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as...
Tor Browser app in the Apple app store is fake and have been found spreading adware and spywares. According to the official website...
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings...
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware...
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Boycott Israel through Smartphones, a higher level of anti-Israel campaign launched by pro-Palestinian activists from Boycott, Divestment and Sanctions movement (BDS). The Boycott...
Indian politicians have taken social media to its greatest height during the coming 16th Lok Sabha elections. A politician’s strength and mass following...
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn...
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign" details our analysis of a set...
More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a...
Apple’s Mac OS X Mavericks has some very neat privacy features built in - from a “Guest User” account which restricts people...
The official website of Regional Integrated Multi-Hazard Early Warning System for Africa and Asia (RIMES) has been hacked and defaced by Indonesian hacking...
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures...
The CIA and the US senate committee are at loggerheads, according to media reports on Tuesday. This meme describes the Hypocrisy at...
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams