A new app, Snoopwall, could offfer Android users some protection against apps which listen to user data - and transmit it -...
A tiny new iris-scanner which plugs into smart devices and PCs could eradicate the need for passwords entirely - and it offers...
Edward Snowden, the former NSA contractor for the National Security Agency (NSA), had alleged through his leaked documents that the NSA along...
The latest episode of The Simpsons, “Steal This Episode” , aired on 5th Jan on Fox is an apt sitcom dealing with illegal...
Patrick Garratt is a 15-year veteran of the gaming industry, having been behind the launches of major news sites such as Eurogamer...
Is there really anything new to be said about tech support scams? Unfortunately, the FTC tells us there is. Not only because...
Academics from all over the world have joined hands in form of a protest against mass surveillance. There has been an increasing...
Weird are the ways in which law takes its course/action and most of the times it leaves a common man bewildered—are the...
Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by...
There are plenty of scams effective enough to rate a warning or three, in the hope of alerting potential victims to the...
The online Hacktivist group Anonymous has hacked and defaced the official website of a Mississippi-based white supremacist organization The Nationalist Movement (nationalist.org) for #OpAntifa. Hackers...
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data...
Earlier we reported that Facebook will send your conversation data to TV networks and how Facebook stores everything you type on the social network...
Many popular models of wireless router from brands such as Linksys and Netgear are vulnerable to a ‘backdoor’, which could allow attackers...
Hackers have published what they claim is a database of 4.6 million Snapchat users, with phone numbers matched to usernames, which is...
Pro Bashar Ul Assad hackers from Syrian Electronic Army (SEA) had hacked the official blog, Facebook and Twitter account of instant messaging client...
TAO, the arm of the US National Security Agency (NSA), is embroiled in penetrating the security structures of Apple iPhone; and this...
Two researchers have demonstrated an attack that could alter and steal data direct from MicroSD cards, using tiny microcontrollers on the cards...
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 - so If you’re a...
Dog-themed cryptocurrency Dogecoin fell victim to two robberies over the holiday season, as hackers hit two sites which traded in the cult...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage