Germany's Chaos Computer Club released a video showing how a "fake fingerprint" made from latex could be used to fool the sensor,...
The New York Police Department has issued a statement in which users have been asked to update their iPad and iPhone devices...
A Jordanian hacker going with the handle of Evil-Jo has hacked and defaced the official website of Palestine Ministry of Justice yesterday...
One lucky hammer group had already nailed the fingerprint sensor of iPhone 5S. The phone will finally hit the sales floor on...
A Pakistani hacktivist group going with the handle of Team Madleets have hacked and defaced five (5) official Google domains designated for Republic of...
Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit –...
Famous Indian hacker going with the handle of Yamraaj has hacked and defaced one of the official website of Bangladeshi Prime Minister...
The online hacktavist AnonGhost has hacked and defaced 75 Israeli websites from 15th to 19th September. AnonGhost left a deface page along...
Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media...
A stealthy banking Trojan known as Caphaw or Shylock has resurfaced - and is attacking customers of 24 American banks. It's armed...
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that...
Pakistani hacktavists from MaDleets TeaM have defaced the official websites of Pakistan Military Engineer Services (mes.gov.pk), Pakistan Bar Council (pakistanbarcouncil.org) and Secretariat...
Michael Hayden who is the former director of CIA and NSA gave a speech at the educational forum at Saint John’s Episcopal...
A recent report given by the Daily Mail has revealed that due to the privacy issues, Facebook users are leaving the social...
Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying...
A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac...
Ever thought to buy an iPhone or a Play Station for free? well you could but its too late now, as an...
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president...
Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already...
Iranians were surprised to see Social media websites working inside the country without using any proxy server or virtual private network (VPN)...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft