If computers continue to run Windows XP, and don't receive any more security patches. they are not just putting themselves and the...
An attack on the forums for the Boxee internet-TV service has yielded 158,000 customer passwords - and what appears to be email...
Mobile applications collecting personal data of users in one form or the other is no more a stunning news. The Snowden documents...
On 31st March, 2014, a hacker going with the handle of ”YMH” hacked and defaced the official website of Egyptian Armed Forces Training Authority....
DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes...
A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans...
Samsung's Galaxy S5 offers a cutting-edge component that will change m-commerce forever - a fingerprint-scanner which offers instant authentication with one finger-swipe...
Documents leaked by the ex-NSA contractor and the whistleblower, Edward Snowden, indicate GCHQ and NSA along with the US government were hand...
The official website belonging to the Ministry of Internal Affairs of Kuwait was hacked and defaced on 26th March, 2014 by unknown...
Microsoft has issued a warning about a possible hacking attempt through an RTF exploit code, according to its official blog. The latest...
A Pakistani hacker going with the handle Hasnain Haxor from Pakistan Haxor Crew has hacked and defaced the official website of Pakistani consulate in...
Spammers are taking advantage of the various online petitions against the recent news about the alleged arming of the Syrian rebels by...
The official Twitter account of Ecuadoran president Rafael Correa was hacked last Thursday with several anti-government tweets spammed over the social media. The hacked Twitter...
The pro-Palestinian hacktivist AnonGhost has hacked and defaced the official website of Israeli Agricultural Research Organization, which is ran by Israeli Ministry of...
Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from...
Will the future be a murderous game of 'smart device' Cluedo, where Colonel Mustard meets his death at the hands of a...
Hackers could take control of Philips ‘smart TVs’ and broadcast their own ‘shows’ to watching famlies, thanks to a ‘fixed’ password which...
Anonymous threatens cyberattack on Albuquerque Police Department for shooting and killing mentally ill homeless man James M. Boyd. File photo of mentally ill...
A security firm has revealed that hackers are targeting companies utilizing services of Monster Jobs, a well-known job portal, through a new...
A young MIT student has invented a new system for storing data which could offer protection against unscrupulous colleagues - and even...
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications