Devices brought to Sochi get apparently hacked within few moments of being connected to a Wi-Fi network, according to NBC Nightly News’...
A tiny, cheap gadget which can ‘hack’ into the network of modern cars to receive radio commands ranging from controlling steering and...
419s are a well-known scam type, but some scams are more obvious than others. And sometimes it's the seller who's cheated not...
Attackers involved in the Target breach, which led to the theft of 40 million debit and credit card details late last year,...
The latest in the series of Snowden revelations include attacks of British spies on hacktivists of Anonymous and LulzSec. According to NBC...
JERUSALEM: Two Israeli combat pilots were jailed for five days and 12 others were disciplined for storing operational maps on their smartphones,...
A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out...
Weak passwords and rarely updated software are a recurring theme behind the 48,000 cyber incidents reported to the Department of Homeland Security...
A Department of Commerce committee will meet for the first time this Thursday to begin discussions on a standard of guidelines for...
It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.
Pirate party members from Iceland and Sweden have nominated Edward Snowden and Chelsea Manning for Noble prize award. Such a recognition for...
RedHack, Turkish hacktivists, breached into the databases of Turkey-based ISP TTNET, and mobile operators, Vodafone and TurkCell, to protest against the death...
A terror suspect has challenged the constitutionality of the NSA’s surveillance program alleging that the federal government has gone too far on...
Eleven high school students have been expelled after being caught bugging their teachers’ computers with a key logger device to change their...
White Lodging, a hotel management firm that works under brands including Hilton and Marriott, has suffered a credit card hack revealing customers'...
The pro-Bashar Al Assad hacking group Syrian Electronic Army has hacked into the domain registry of world renowned online shopping and money transaction...
Hacktivists from Ukrainian neo-fascist ‘Svoboda’ party hacked and defaced more than 30 Ukrainian government and media websites. Hackers have left a deface...
Yahoo has been hacked again. On Thursday Yahoo announced that usernames and passwords of its email users have been stolen by unknown hackers. The...
Yahoo has announced that its email system has recently been subject to a “coordinated effort to gain unauthorized access”.
The key to beating hackers might not just lie in stronger security measures and ‘unbreakable’ passwords. Now, it seems like an element...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage