Nathan Collier of Webroot ThreatVlog, talks about an old, but still active, SMS Fake Installer, a Russian based program used to trick...
Members of the Rio de Janeiro state voted on Tuesday (September 10th) a bill that prohibits every kind of mask, especially Guy...
The online hackavist going with the handle of AnonGhost along with TeamR00t have claimed to hack and deface around 400 Israeli websites...
The online hacktavist group Z Company Hacking Crew (ZHC) has hacked and defaced the official website of Octic International that act as...
What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available...
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” - a vegetable extract used in weight loss supplements....
The Syrian Electronic Army is back in news by hacking the official Hootsuite account of FOX TV, used to post online content...
Apple introduced biometric security to iPhone for the first time with the launch of its new iPhone 5S, featuring what Apple describes...
Microsoft Corporation has entered into a $7 Billion agreement with Nokia purchasing its cell phones and devices business. The deal which will...
Two Indonesian hackers going with the handle of SultanHaikal and Brian Kamikaze have hacked and defaced total 627 random websites under the...
After taking quite a long break from comment moderation on the WeLiveSecurity blog, I’ve recently started receiving comment notifications and have therefore...
Keylogging tools to steal personal information from victims are available as a “service” from a site known as PrivateRecovery, which offers the...
Simply holding your phone a few inches from your PC to "hear" signals inaudible to humans will be enough to log in...
National Aeronautics and Space Administration (NASA) which is now more famous for its poor cyber security rather than any else is again under attack,...
In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network...
When Apple unveils its new iPhone models Tuesday, one particularly persistent rumor may come true - that at least one model of...
Four out of five consumers have been “locked out” of websites due to not remembering log-ins - and over a fifth rely...
Syrian Electronic Army, known as pro Bashar Ul Assad group has been labeled as a terrorist organization by U.S. Federal Bureau of...
A hacker going with the handle of Black Angels has hacked and defaced two official websites of Turkish government ministry of Food, Agriculture...
You can still browse anonymously on the internet and the perception that our emails are being spied is ”wrong”, says Fabio Coelho, Country...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw