The official website of Palestinian Broadcasting Corporation (PBS) has been hacked and defaced by a hacker going with the handle of gOx....
The pro-Syrian President hackers from Syrian Electronic Army has hacked the official website of Vice Magazine (vice.com) for publishing article, revealing the identities...
A cyberheist targeting a bitcoin "bank" website has netted thieves more than 4,100 bitcoins, worth $1.2 million. The hack is among the...
The system relies on users describing patterns of blots, then matching descriptions to patterns - and should be foil the automated programs...
Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on...
Only weeks after the closure of Silk Road, a “drug market” which authorities claim shipped $1.2 billion of drugs including heroin around...
The FBI added five new cybercriminals to its Most Wanted list - including a new entry at number one, Alexsey Belan. The...
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world....
A new app lets you unlock Mac computers without entering a password - users simply tap on a paired iPhone with the...
Adobe’s security breach laid bare 38 million passwords to the world - and a security researcher claims that 1.9 million of these...
Tom Hanks and Donald Trump are among a client list of 850,000 users of limousines and town cars to become the latest...
Google may soon offer Chrome users a little extra protection for their passwords - which could previously be accessed in “one click”...
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his...
Users of Google's Chrome browser will be able to "purge" rogue plug-ins, after attacks where a supposedly helpful browser add-on contains malware...
Smart calendar app Sunrise has revealed it fell victim to the same cyberattack which saw social sharing app Buffer sending out thousands...
The Guardian has come up with in depth analysis of documents leaked by NSA’s whistleblower Edward Snowden. The presentation shows what came...
Germany’s Green Party leader Hans-Christian yesterday met NSA’s whistleblower met Edward Snowden in Moscow where Snowden was invited to testify against NSA in...
A Turkish hacker going with the handle of Misafir has hacked and defaced official Google Bolivia domain on 30th Oct 2013 along...
A survey of 1,900 executives at clients of the accountancy firm Ernst and Young found that almost all (96%) felt “unprepared” for...
The official website of Nigerian Ministry of Defence (http://www.mod.gov.ng/) has been hacked and defaced by world renowned hackers from Moroccan Ghosts hacking group. The site...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft