Tiny things such as using an admin account on your PC when you don’t need to can give cybercriminals their “way in”....
Smartphone users want more protection for the data on their cellphone - and are perfectly comfortable being fingerprinted if that’s the best...
The newly formed Intellectual Property Crime Unit of the City of London Police (IPCU) is in action. In its first operation the...
Famous Syrian Hacker Dr.SHA6H has hacked and defaced the official website of U.S. City of Mansfield, OH earlier today in support of a...
Cyber attacks against Industrial Control Systems pose a risk to power plants and other critical infrastructure - and action is needed to...
The costs of cybercrime have continued to rise for victims, for the fourth consecutive year, according to a survey conducted by the...
The official domains of Alexa internet search have been hacked and defaced by Anonymous Palestine affiliated group KDMS Team. KDMS hackers left...
The official website of world’s most famous mobile messaging app Whatsapp, anti-virus giant Avira and AVG were defaced by newly emerging group of hackers...
Apple’s fingerprint sensor has drawn a huge amount of attention (and hack attempts) ever since it launched on iPhone 5S - but...
A cyber “war game” will test Britain’s financial system to its limits in a virtual attack which will test the defenses of...
The human voice can be used as a secure, quick way to identify people, claims Bretislav Beranek of voice-recognition software company Nuance....
Plugging your smartphone in to charge up could soon offer an alert that you’ve contracted malware - with a new charger that...
Dr.SHA6H, a hacker who claims to be from Syria who apposes President Bashar Ul Assad has hacked and defaced the official website...
Internet Explorer users will be a great deal safer from Tuesday onwards, after Microsoft announced a patch for a vulnerability that has...
Adobe Systems, makers of popular software such as Acrobat, admitted on Thursday that hackers had penetrated its systems and stolen source code...
The multinational computer software company Adobe Systems, Inc has notified its users via their blog that the company has been hit by...
The official website of United Nations Honduras has been hacked and defaced by a hacker going with the handle of Ch4FeR, which...
A group of hackers going with the handle of “The Hole Seekers” have hacked and defaced a famous Bitcoin discussion forum on...
A motion has been filed today with the Foreign Intelligence Surveillance Court by the U.S Department of Justice. This motion is basically...
The head of the cyber warfare program of Iran has been shot dead. This act will further boost the allegations that the...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks