Hacktivists going with the handles of Anonymous Tunisia and AnonGhost have taken down websites of 11 private Israeli banks in a DDoS attack....
Briton based BBC was hacked and its computer server was on sale this Christmas. A hacker took control of computer servers at...
A phishing scam targeting Tesco bank customers puts on a festive party hat and pretends to offer something for nothing. Is this...
Critical vulnerability in Samsung Galaxy S4 allows hacker to install a malicious code, track emails and record sensitive communication data. An Israeli...
Syrian Hacker Hacks Mali and El Salvador United Nations Population Fund against Syrian Conflict. A Syrian hacker going with the handle of Dr.SHA6H...
A federal judge has said in his ruling that spying and collecting personal information of American citizens is completely legal and a ”counter-punch”...
NSA‘s whistle blower Edward Snowden has a special message for you on this Christmas. We thank Mr. Snowden for his contribution in...
The NSA’s whistle blower Edward Snowden has said that ‘’he has already won, he has achieved what he dreamed of ’’ especially...
Here, J.R. Rao, IBM Director for Security Research, explains why the idea of a digital guardian who watches for unusual behavior is...
An online poker site which did all its cash-ins and cash-outs in Bitcoin has admitted to a data breach in which 42,000...
Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.
Details of 40 million customer debit and credit cards may have leaked in a data breach at American retailer Target - which...
This holiday season, shoppers are turning to mobile as a new way to hunt bargains, with purchases via mobile platforms nearly doubling...
Despite Snowden’s voluntarily offer to help Brazil in investigating National Security Agency’s (NSA) spying activities against the country, the land of beauty...
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR...
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to...
The two million people who had chosen “123456” as their Adobe password were widely mocked online after the company's security breach -...
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.)...
Facebook detects and stores everything you type on the social network even if the message is not published. Most of us are...
The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being...
Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data
Beware: These Fake Antivirus Sites Spreading Android and Windows Malware
Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024
JAVS Courtroom Recording Software Backdoored – Deploys RustDoor Malware
Stealthy BLOODALCHEMY Malware Targeting ASEAN Government Networks
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
Inside Operation Diplomatic Specter: Chinese APT Group’s Stealthy Tactics Exposed
Are Your SaaS Backups as Secure as Your Production Data?
Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager
Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries
Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
QNAP Patches New Flaws in QTS and QuTS hero Impacting NAS Appliances
Critical Veeam Backup Enterprise Manager Flaw Allows Authentication Bypass
Critical GitHub Enterprise Server Flaw Allows Authentication Bypass
Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
NextGen Healthcare Mirth Connect Under Attack – CISA Issues Urgent Warning