A Californian blogger was among victims of a malware attack which targeted critics of the communist state in Vietnam, as well as...
Although Snowden is held in high esteem by ordinary citizens of America, as a whistle-blower, there are quite a few who swear...
The ‘magnetic stripe’ credit cards used by American banks should be replaced with the more secure chip-and-PIN systems standard in Europe and...
The online hacktivist AnonGhost along with a group of hackers has decided to attack Israeli cyber space on 7th April, 2014 when...
The online hacktivist Anonymous has taken down the official website of Fullerton police department in retaliation for the arrest of protesters and citizen journalists....
Delivering a speech on NSA reforms after seven months since the first revelations on NSA by Edward Snowden, President Obama remained unapologetic...
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically,...
Cisco claims in its report that cybercrime is now a global, professional industry - and there is a worldwide shortage of professionals...
Post-Snowden revelations about NSA snooping on private data of almost every individual, Silent Circle, a Switzerland based encryption firm, has partnered with...
The computer giant announced the change of policy in an official blog post in which it said that although XP was no...
Thousands of hotels have found that their listings on Google Maps and Google+ have been ‘hijacked’ - pointing instead to different sites,...
RedHack Leaks 4k Turkcell numbers against facilitating Ministers with new numbers. The famous hacktivist group RedHack has leaked phone numbers of more...
Starbucks has promised to update its mobile app - the most-used mobile payment app in America - after a security researcher found...
The internet security software company AVG is in trouble, this time the company has been attacked by hackers from Indonesia and Pakistan who have...
At CES 2014, the app was king - and more importantly, the appcessory - fridges, lights, appliances and gadgets built for app...
A secret technology which relied on radio transmissions has allowed the National Security Agency to spy on computers disconnected from the internet...
Computer users often feel bombarded by warnings about malware - particularly in internet browsers, which often repeatedly warn about risky sites -...
A group of Turkish hackers going with the handle of @Turkguvenligi on Twitter has hacked and defaced the official website (http://leaks.sea.sy/) of high...
The US government’s extensive dragnet across the country keeping track of almost everything that travels across the internet and following every single...
Major international cyber attacks follow a pattern - and attacks such as Stuxnet, which targeted Iran's nuclear plant can be predicted by...
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets