All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as...
A UK citizen has sued Microsoft for leaking PRISM private data to the NSA. A UK court will be carrying out an action...
A hacker from United States has managed to devise method to Hijack or take control of Consumer drones. This will enable the...
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker...
FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners....
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area...
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC...
A Turkish based hacking group going with the handle of ‘Ayyıldız Tim’ (Ayyıldız Team) has hacked and defaced the official website of United...
Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security...
APTs - or Advanced Persistent Threats - are the most menacing cyber attack there is, some say. Built to be stealthy, they...
As wireless technologies and electronic controls are increasingly built into cars, vehicles could become vulnerable to hackers - either stealing information, or...
Microsoft's telepathic power, of course, comes from AI, not magic, and illustrates very clearly which passwords are easy for a computer to...
For years, "encryption" has sounded like James Bond technology to many PC users - but new systems have made "crypto" technology easier...
Only weeks after Microsoft unveiled a global Cybercrime Center armed with new, hi-tech tools to combat crime, it announced it had carried...
Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered....
A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes - using malware to deactivate Google’s locks on...
Wednesday: I am not allowed to use iPhone for security reason: President Barak Obama. President Barak Obama has given an unusual statement during...
Personal information for up to 465,000 customers of JP Morgan, Chase & Co. may be at risk after hackers breached its network...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor