An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the...
It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can...
Twelve municipal guards in the city of Araraquara (273 km from Sao Paulo) Brazil have been suspend from their jobs of monitoring...
The official website of Nigerian Federal Ministry of Finance (http://www.fmf.gov.ng ) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. Hackers left a...
A leaked two-page pamphlet for NSA employees reveals the organization instructed each employee on some key “talking points” to bring up in...
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Your next PC password could be President Bill Clinton kissing a fish - and that disturbing mental image, and similar surreal “story...
NSA banks on Google cookies for pinpointing hacking targets. Google cookies which are utilized by advertisers to track consumers are also being used...
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting...
All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as...
A UK citizen has sued Microsoft for leaking PRISM private data to the NSA. A UK court will be carrying out an action...
A hacker from United States has managed to devise method to Hijack or take control of Consumer drones. This will enable the...
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker...
FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners....
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area...
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC...
A Turkish based hacking group going with the handle of ‘Ayyıldız Tim’ (Ayyıldız Team) has hacked and defaced the official website of United...
Have you checked out the weekly podcast by ESET security researchers? It's called the ESET Malware Report and it covers many security...
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024