A group of Turkish hackers have hacked the official Twitter account of Mustafa Varank, who is a top political advisers of Prime...
Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don't...
A tech-firm has amazed the world with its proof-of-demonstration of a remote-controlled “stun copter” that can deliver 80,000 volts of electricity to...
Smartphones such as iPhone 5S rely on buttons to scan fingerprints - but the CEO of biometrics firm CrucialTec says that smartphones...
A futuristic app uses Google Glass to add an extra layer of privacy for users withdrawing cash from ATM machines - by...
Boeing is set to launch a self-destructing smartphone that would aid the spies, diplomats and others keep their data secure, according to...
A file of material purporting to include detailed information on trades at the Bitcoin exchange Mt Gox, has surfaced online, after attackers...
Recently it was announced that Satya Nadella will be Steve Ballmer’s successor as CEO of Microsoft. Of course for the cybercriminals this...
Befriending the wrong person on Facebook can hand a criminal the tools for an identity theft attack - and on LinkedIn, talking...
Maybe it's time to think twice before rushing to click on a link, next time your favourite celebrity says something bizarre on...
Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how...
University of Berkeley researchers have revealed a technique for identifying individual web pages visited ‘securely’ by users, with up to 89% accuracy,...
A document among the trove leaked by Edward Snowden contains slides showing images of flying saucer as reported by Yahoo News Following...
The telecommunication system of Ukraine has got hit by cyber-attacks through the equipment which have been installed in the Russian-influenced Crimea. These...
If someone rings you up to tell you that your bank card has been compromised, it may be because they want to...
Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” - a bogus version of Netflix which sends password...
Ex-NSA tech Snowden leaked documents had yet another element of surprise; it has a set of slides depicting mysterious spacecrafts referring to Flying...
Criminals seeking to kill endangered species and sell trophies online are turning to increasingly hi-tech methods to target their prey - including...
The attackers were able to steal all the bitcoins stored in the bank’s “hot wallet” - the portion of its funds on...
When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor