Less than half of parents use parental controls on internet-enabled devices bought for their children - leaving millions of youngsters potentially exposed...
The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal...
USA identifies its drone targets based on NSA metadata, a flawed tactic, according to reports published in the Intercept. A former NSA...
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims' computers without the knowledge of their owners. Graham...
Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires...
Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication...
Snapchat app vulnerability is highlighted again, and this time the hackers can temporarily freeze your iPhone and force restart, according to media...
Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy...
This small sized device could hack a car, let’s see how the researchers demonstrate. Auto makers over the years have paid less...
A small American law firm has admitted that every document on a server at the North Carolina company has fallen prey to...
A fake version of Facebook’s 10th anniversary celebration video page, ‘A Look Back’ is spreading via the social network, with users directed...
Missed a phone call? The Better Business Bureau says answering international telephone fraud calls looking like US calls might cost you more...
An Anonymous hacker going with the handle of @TheHorsemenLulz has hacked 4 official Social Media accounts of UAE‘s Dubai Police. The hacked accounts include LinkedIn,...
Edward Snowden, the American whistleblower, used a very simple ‘Web crawler’ to collect controversial NSA data, according to a senior intelligence official...
Websites though being secured remains at a risk of getting attacked in one or the other way. Internet is coming up with...
An Iranian hacker going with the handle of Dr.3v1l has hacked and defaced the official website of President of Nepal. Screenshot of the...
Managers at White Lodging, a hotel management firm that works with various brands including Hilton, Marriott, Westin, Sheraton and Hyatt, may have...
Body odor could be used as a biometric identifier, with high rates of accuracy, due to chemical patterns in the smell that...
The Turkish parliament has accepted a highly controversial reversal to a cyber law, granting authorities full power to block certain websites in...
The hardcore supporter of Syrian President Bashar Al Assad and the online hacktavist Syrian Electronic Army has made an attempt to hack...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage