The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal...
USA identifies its drone targets based on NSA metadata, a flawed tactic, according to reports published in the Intercept. A former NSA...
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims' computers without the knowledge of their owners. Graham...
Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires...
Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication...
Snapchat app vulnerability is highlighted again, and this time the hackers can temporarily freeze your iPhone and force restart, according to media...
Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy...
This small sized device could hack a car, let’s see how the researchers demonstrate. Auto makers over the years have paid less...
A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to...
A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed...
Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more...
An Anonymous hacker going with the handle of @TheHorsemenLulz has hacked 4 official Social Media accounts of UAE‘s Dubai Police. The hacked accounts include LinkedIn,...
Edward Snowden, the American whistleblower, used a very simple ‘Web crawler’ to collect controversial NSA data, according to a senior intelligence official...
Websites though being secured remains at a risk of getting attacked in one or the other way. Internet is coming up with...
An Iranian hacker going with the handle of Dr.3v1l has hacked and defaced the official website of President of Nepal. Screenshot of the...
Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have...
Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that...
The Turkish parliament has accepted a highly controversial reversal to a cyber law, granting authorities full power to block certain websites in...
The hardcore supporter of Syrian President Bashar Al Assad and the online hacktavist Syrian Electronic Army has made an attempt to hack...
Devices brought to Sochi get apparently hacked within few moments of being connected to a Wi-Fi network, according to NBC Nightly News’...
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Compromising Cryptographic Key Security Through PuTTY: A Deep Dive into CVE-2024-31497
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files