The like button is a highly interactive feature of social media giant Facebook. A British public-service television broadcaster has however revealed that hackers are...
An international plot which would have turned huge numbers of PCs into “bricks” by using deeply buried malware was foiled by the...
It seems as if those business which bowed down in front of NSA are now facing a backlash. That’s what we can...
Twelve municipal guards in the city of Araraquara (273 km from Sao Paulo) Brazil have been suspend from their jobs of monitoring...
The official website of Nigerian Federal Ministry of Finance (http://www.fmf.gov.ng ) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. Hackers left a...
A leaked two-page pamphlet for NSA employees reveals the organization instructed each employee on some key “talking points” to bring up in...
we provide more detail on the most exploited applications and advise a few steps users can (and should) take to further strengthen...
Your next PC password could be President Bill Clinton kissing a fish - and that disturbing mental image, and similar surreal “story...
NSA banks on Google cookies for pinpointing hacking targets. Google cookies which are utilized by advertisers to track consumers are also being used...
11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting...
All of the top 100 apps on Google's Play store have been hacked, and hackers now specifically target financial apps, such as...
A UK citizen has sued Microsoft for leaking PRISM private data to the NSA. A UK court will be carrying out an action...
A hacker from United States has managed to devise method to Hijack or take control of Consumer drones. This will enable the...
Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker...
FBI has formulated some advanced surveillance techniques which enable them to secretly activate web cams for spying on the suspected computer owners....
This week, UK IT worker and social engineering blogger Dale Pearson was targeted - with eight phone calls from a company claiming...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Few things are sacred to today’ cybercriminals - and true love certainly isn’t one of them. Dating scams are a fast-growing area...
The FBI custom-designs malware to snare suspects, a court has heard, and has been able “for years” to watch suspects through PC...
A Turkish based hacking group going with the handle of ‘Ayyıldız Tim’ (Ayyıldız Team) has hacked and defaced the official website of United...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment