Critical vulnerability in Samsung Galaxy S4 allows hacker to install a malicious code, track emails and record sensitive communication data. An Israeli...
Syrian Hacker Hacks Mali and El Salvador United Nations Population Fund against Syrian Conflict. A Syrian hacker going with the handle of Dr.SHA6H...
A federal judge has said in his ruling that spying and collecting personal information of American citizens is completely legal and a ”counter-punch”...
NSA‘s whistle blower Edward Snowden has a special message for you on this Christmas. We thank Mr. Snowden for his contribution in...
The NSA’s whistle blower Edward Snowden has said that ‘’he has already won, he has achieved what he dreamed of ’’ especially...
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is...
An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000...
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target - which...
This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling...
Despite Snowden’s voluntarily offer to help Brazil in investigating National Security Agency’s (NSA) spying activities against the country, the land of beauty...
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR...
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to...
The two million people who had chosen “123456” as their Adobe password were widely mocked online after the company's security breach -...
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.)...
Facebook detects and stores everything you type on the social network even if the message is not published. Most of us are...
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being...
A Firefox add-on has turned 12,500 users of the browser into a botnet which scours every page visited by infected users for...
A new ‘Smart ID’ card, BluStor, aims to “eliminate hacking and identity theft” - using a combination of voiceprints, fingerprints and iris...
The assault by cybercriminals against big businesses continued this year -78% were attacked by outsiders, according to a report by Price Waterhouse...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment