The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as...
Tor Browser app in the Apple app store is fake and have been found spreading adware and spywares. According to the official website...
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings...
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware...
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Boycott Israel through Smartphones, a higher level of anti-Israel campaign launched by pro-Palestinian activists from Boycott, Divestment and Sanctions movement (BDS). The Boycott...
Indian politicians have taken social media to its greatest height during the coming 16th Lok Sabha elections. A politician’s strength and mass following...
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn...
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign" details our analysis of a set...
More than 80% of business leaders do not feel fully prepared for the effects of a major cyber incident, according to a...
Apple’s Mac OS X Mavericks has some very neat privacy features built in - from a “Guest User” account which restricts people...
The official website of Regional Integrated Multi-Hazard Early Warning System for Africa and Asia (RIMES) has been hacked and defaced by Indonesian hacking...
It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures...
The CIA and the US senate committee are at loggerheads, according to media reports on Tuesday. This meme describes the Hypocrisy at...
A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer...
A new wearable authenticator built to be the key to “everything” will be designed by some of the hottest new talents in...
The scammers take advantage of every incident to trick people and get some bucks or likes on social media. Same is going...
A group of Ukrainian hackers going with the handle of CyberBerkut has taken down the official website of North Atlantic Treaty Organization (NATO) along with...
Bad news for WhatsApp users on Android. If you chat on WhatsApp, it’s time to be careful and avoid getting too private. An...
Syrian Hackers have stated that they have compromised the central command of the US. Syrian Hackers Claim They’ve Compromised US Central Command...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft