In 2012, we reported that US NAVY faces 110,000 cyber attacks every hour. Now a report has gone viral that Iran’s penetration into...
An emotional appeal posted on the dark market’s official forum clearly stated that “We have been hacked” and nearly $2.4 to $2.7...
Google has bought a company offering a new form of two-factor authentication - using “silent” sounds played via PC and smartphone speakers...
A roundup of scam information, including a tax scams article, email with a link to malware, a phish, and the worlds laziest...
Mac OS X is a slick, easy-to-use operating system with an impressive record on security – and basic malware detection built in...
Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers - even ones...
Could places, not phrases, be the basis of secure passwords. UAE researchers have created a system for creating complex passwords using facts...
Security expert Graham Cluley takes a look at the Kickstarter hack, and discovers there's more to think about than just changing your...
Ron Paul, a former Texas congressman, has launched a petition seeking clemency for Edward Snowden, the whistleblower who leaked data about the NSA surveillance...
An Egyptian hacker removed Mark Zuckerberg’s Facebook timeline cover photo from his account using a private exploit, according to a latest hacker...
According to the officials, the security forces of Brazil are constantly using secret agents and thoroughly supervising the social media in order...
World renowned hacktivists from LulzSec Peru have hacked a verified Twitter account of United Socialist Party of Venezuela (PSUV). After taking over the Twitter account, the hacktivists...
Turkish based RedHack hacktivist claims to leak personal information and contact details of US embassy’ staff in Turkey. The dumped data shows...
The hardcore supporters of Syrian President Bashar-Al-Assad from Syrian Electronic Army have hacked the American business magazine Forbes. As a result of hack, a...
A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves -...
Activists in Ukraine are fighting a battle on ground, while hacktavists are putting their share online. The Anonymous Ukraine, in an email...
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds...
For temporary abandoning the services of the host that is connected to some internet, the most widely used and favorite method that...
Kaspersky Lab, the Moscow-based computer security software firm, has unearthed a cyber-spying campaign apparently started by a Spanish-speaking country. The campaign targeted...
If your system administrator looks a little frazzled this week, be nice to him or her and don't grumble too much about...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor