Germany's Chaos Computer Club released a video showing how a "fake fingerprint" made from latex could be used to fool the sensor,...
The New York Police Department has issued a statement in which users have been asked to update their iPad and iPhone devices...
A Jordanian hacker going with the handle of Evil-Jo has hacked and defaced the official website of Palestine Ministry of Justice yesterday...
One lucky hammer group had already nailed the fingerprint sensor of iPhone 5S. The phone will finally hit the sales floor on...
A Pakistani hacktivist group going with the handle of Team Madleets have hacked and defaced five (5) official Google domains designated for Republic of...
Android gamers have been warned to be wary of Grand Theft Auto V’s official “partner” app – Grand Theft Auto iFruit –...
Famous Indian hacker going with the handle of Yamraaj has hacked and defaced one of the official website of Bangladeshi Prime Minister...
The online hacktavist AnonGhost has hacked and defaced 75 Israeli websites from 15th to 19th September. AnonGhost left a deface page along...
Cybercriminals are switching tactics, a leading security body has warned - and the combination of anonymisation technologies, mobile devices, and social media...
A stealthy banking Trojan known as Caphaw or Shylock has resurfaced - and is attacking customers of 24 American banks. It's armed...
This is a quick reminder that the September 23 deadline for compliance with the new HIPAA regulations is rapidly approaching. Organizations that...
Pakistani hacktavists from MaDleets TeaM have defaced the official websites of Pakistan Military Engineer Services (mes.gov.pk), Pakistan Bar Council (pakistanbarcouncil.org) and Secretariat...
Michael Hayden who is the former director of CIA and NSA gave a speech at the educational forum at Saint John’s Episcopal...
A recent report given by the Daily Mail has revealed that due to the privacy issues, Facebook users are leaving the social...
Malware, phishing and ID thieves are everywhere - but you don’t have to be paranoid, or hang back, or stop yourself enjoying...
A picture of a smooching couple actually delivers a kiss of death to Mac OS X users - it’s a new Mac...
Ever thought to buy an iPhone or a Play Station for free? well you could but its too late now, as an...
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president...
Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already...
Iranians were surprised to see Social media websites working inside the country without using any proxy server or virtual private network (VPN)...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment