A profile Syrian hacker going with the handle of Dr.SHA6H has hacked the official website of German based Avira antivirus software company designated...
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an...
“Passwords are done at Google,” said Heather Adkins, Google’s information security chief - and said that “the game is over” for start-ups...
These days cybercriminals will use phone calls, SMS messages, emails, fake apps - and even couriers - in an effort to get...
The National Security Agency (NSA) shares first hand intelligence with Israel without omitting personal details of U.S citizens, shows top-secret document handing...
Nathan Collier of Webroot ThreatVlog, talks about an old, but still active, SMS Fake Installer, a Russian based program used to trick...
Members of the Rio de Janeiro state voted on Tuesday (September 10th) a bill that prohibits every kind of mask, especially Guy...
The online hackavist going with the handle of AnonGhost along with TeamR00t have claimed to hack and deface around 400 Israeli websites...
The online hacktavist group Z Company Hacking Crew (ZHC) has hacked and defaced the official website of Octic International that act as...
What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available...
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” - a vegetable extract used in weight loss supplements....
The Syrian Electronic Army is back in news by hacking the official Hootsuite account of FOX TV, used to post online content...
Apple introduced biometric security to iPhone for the first time with the launch of its new iPhone 5S, featuring what Apple describes...
Microsoft Corporation has entered into a $7 Billion agreement with Nokia purchasing its cell phones and devices business. The deal which will...
Two Indonesian hackers going with the handle of SultanHaikal and Brian Kamikaze have hacked and defaced total 627 random websites under the...
After taking quite a long break from comment moderation on the WeLiveSecurity blog, I’ve recently started receiving comment notifications and have therefore...
Keylogging tools to steal personal information from victims are available as a “service” from a site known as PrivateRecovery, which offers the...
Simply holding your phone a few inches from your PC to "hear" signals inaudible to humans will be enough to log in...
National Aeronautics and Space Administration (NASA) which is now more famous for its poor cyber security rather than any else is again under attack,...
In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware - the way it handles network...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan