Famous South Korean Search Portal NAVER Hacked, 25 Million accounts Hacked Using Stolen Data. A hacker going with the handle of ‘Seo’...
Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support...
Dynamic or on-access Mac testing of AV products is problematical with samples for which Apple has implemented signature detection.
A possibility that Muslim hackers could have compromised the IsraelDefense magazine (www.israeldefense.com) database and its website, to launch the recent SMS attack on...
In an exclusive interview with NBC, the ex-American president Mr. Jimmy Carter expressed his views on the NSA; according to which Mr. Carter believes...
Mark Zuckerberg, Paypal founder Elon Musk and Ashton Kutcher have invested $40 million in an artificial-intelligence start-up, Vicarious, which can already 'read'...
NSA hacked into servers of Huawei Technologies, a Chinese network manufacturer, and collected information to plant ‘backdoors’ on their equipment, according to...
Bitcoin’s developers have released a new version of the software, which includes a long-awaited fix for the “transaction malleability” bug which is...
A hacker going with the handle of Eth_Spectrum had hacked and defaced the official websites of top Hollywood celebrities including Miley Cyrus, Taylor Swift,...
According to documents leaked by the Syrian Electronic Army, Microsoft have been charging the FBI with millions of Dollars a year for giving them...
Starting today, Gmail will use an encrypted HTTPS connection to check or send email, regardless of what platform users employ to access...
The list of secrets held by the NSA is a never-ending one. Latest in the list includes its refusal to disclose the amount...
The malware problem on Mac OS X is nothing like as bad as it is on Windows, but that doesn't mean it...
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all...
A new form of Android malware could bypass one of the main warning systems built into Google’s smartphone and tablet OS -...
The Target breach, and in particular the role of respected security blogger Brian Krebs in breaking the story, has been optioned as...
Tor Browser app in the Apple app store is fake and have been found spreading adware and spywares. According to the official website...
Facebook’s ‘Deepface’ photo-matching software can now ‘recognize’ human faces with an accuracy just a fraction of a percentage point behind human beings...
Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware...
As Mac malware increases in prevalence, testing security software that supplements OS X internal security gets more important and more difficult.
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
How Safe is Your TinyProxy? Step-by-Step Guide to Exploiting Tinyproxy’s Zero Day Vulnerability
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications