World renowned hacktivists from LulzSec Peru have hacked a verified Twitter account of United Socialist Party of Venezuela (PSUV). After taking over the Twitter account, the hacktivists...
Turkish based RedHack hacktivist claims to leak personal information and contact details of US embassy’ staff in Turkey. The dumped data shows...
The hardcore supporters of Syrian President Bashar-Al-Assad from Syrian Electronic Army have hacked the American business magazine Forbes. As a result of hack, a...
A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves -...
Activists in Ukraine are fighting a battle on ground, while hacktavists are putting their share online. The Anonymous Ukraine, in an email...
Couples who have been in a long-term relationship indulge in risky online behaviour, such as sharing passwords for online accounts, with two-thirds...
For temporary abandoning the services of the host that is connected to some internet, the most widely used and favorite method that...
Kaspersky Lab, the Moscow-based computer security software firm, has unearthed a cyber-spying campaign apparently started by a Spanish-speaking country. The campaign targeted...
If your system administrator looks a little frazzled this week, be nice to him or her and don't grumble too much about...
Nearly two-thirds of employees - 63% - use personal email to transfer work files, potentially leaving workplaces exposed to hacks against their...
A Microsoft survey of 10,000 consumers found that the worldwide annual cost of identity theft and phishing could be as high as...
Less than half of parents use parental controls on internet-enabled devices bought for their children - leaving millions of youngsters potentially exposed...
The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal...
USA identifies its drone targets based on NSA metadata, a flawed tactic, according to reports published in the Intercept. A former NSA...
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims' computers without the knowledge of their owners. Graham...
Over the past two years, many online services have started to offer ‘two-factor authentication’ - an extra security measure which often requires...
Microsoft’s online Office 365 service has added a new layer of protection to users of the online document-editing service, with two-factor authentication...
Snapchat app vulnerability is highlighted again, and this time the hackers can temporarily freeze your iPhone and force restart, according to media...
Fraudulent emails offering refunds of overpaid tax have surged by nearly 50% in the past year, according to a report by Accountancy...
This small sized device could hack a car, let’s see how the researchers demonstrate. Auto makers over the years have paid less...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024