A new ‘Smart ID’ card, BluStor, aims to “eliminate hacking and identity theft” - using a combination of voiceprints, fingerprints and iris...
The assault by cybercriminals against big businesses continued this year -78% were attacked by outsiders, according to a report by Price Waterhouse...
The like button is a highly interactive feature of social media giant Facebook. A British public-service television broadcaster has however revealed that hackers are...
An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the...
It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can...
Twelve municipal guards in the city of Araraquara (273 km from Sao Paulo) Brazil have been suspend from their jobs of monitoring...
The official website of Nigerian Federal Ministry of Finance (http://www.fmf.gov.ng ) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. Hackers left a...
A leaked two-page pamphlet for NSA employees reveals the organization instructed each employee on some key “talking points” to bring up in...
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Your next PC password could be President Bill Clinton kissing a fish - and that disturbing mental image, and similar surreal “story...
NSA banks on Google cookies for pinpointing hacking targets. Google cookies which are utilized by advertisers to track consumers are also being used...
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting...
All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as...
A UK citizen has sued Microsoft for leaking PRISM private data to the NSA. A UK court will be carrying out an action...
A hacker from United States has managed to devise method to Hijack or take control of Consumer drones. This will enable the...
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker...
FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners....
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan