Philips Hue lighting system is vulnerable to attacks which can cause a “perpetual blackout” in the homes of users, according to a...
In reply to Indian hackers for hacking Pakistan Army website, a hacker going with the handle of MindCracker from Pakistan Cyber Army has...
Cybercriminals will unleash a wave of “zero-day” vulnerabilities to attack Windows XP machines after April 8, 2014, a security expert has claimed.
A security flaw has left all Android Bitcoin wallets vulnerable to theft, Bitcoin.org has warned. The vulnerability affects all Bitcoin wallets on...
The Moroccan hacker known to many with the handle of AnonGhost aka Mauritania Attacker has hacked and defaced the official website of Indian...
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations...
Cybercriminals are turning to a new digital currency, Perfect Money, in the wake of the closure of the notorious Liberty Reserve, which...
Don't let your PC end up in someone's zombie army. Gamers are prime targets for cybercriminals - our tips should help you...
Security flaws in some models of HP LaserJet Pro printers can reveal users’ administrator passwords to remote attackers, a researcher has revealed.
I was recently contacted by a journalist researching a story about ‘hackers’ quitting the dark side (and virus writing in particular) for...
A self-styled "hacker" claims that crime can pay - saying that his 3 million-strong PC botnet earns him up to “$15,000 to...
The former chief of NSA and CIA Michael Hayden has pointed out that a hacking attack might be launched against the USA...
A very serious flaw has been pointed out in Google Chrome browser that allows any user who has access to a particular computer...
Someone inside the senate is not much a pro to NSA’s whistleblower Snowden as they are using the platform of Wikipedia to...
A group of hacker going with the handle of Kosova Warriors Group has hacked and defaced the official website of United Kingdom (UK)...
Google’s Chrome browser has been criticized over its password security, after a developer found that anyone logged into the same OS account...
A hacker going with the handle of RedX from Bangladeshi based 3xp1r3 Cyber Army has hacked and defaced the official website of California’s Covina City and Police...
The German developer of the hit shoot ‘em up series Crysis has taken its websites offline after a security breach in which...
The Tor Project has advised users of the anonymous browser to stop using Windows, in the wake of a malware attack which...
Two hackers from different hacking groups going with the handle of SultanHaikal and M3QD4D have hacked and defaced 71 websites owned by the government...
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams