Borrowing an iPhone charger - or using one in a public place - might be more risky than you think. Researchers from...
One in six adults use the name of a pet as the basis of their password, and two-thirds use their partner's name,...
A new ransomware infection scares its victims by invoking the name of the Department of Homeland Security, and the National Cyber Security...
NSA‘s whistleblower Edward Snowden has left the airport after receiving 1 year asylum in Russia from the government. RT reports that Snowden’s representative Anatoly Kucherena...
An Israeli based internet surveillance company ‘Verint Systems‘ is all set to win a contract from Department of Telecommunications, government of India to assist...
A Us solider by the name of Bradley Manning who is known to have handed over thousands of confidential government documents to...
Members of a Russian cybercrime forum attempted to frame respected security blogger Brian Krebs by mailing 13 bags of heroin to his...
A hacker going with the handle of @Phr0zenM on Twitter has claimed to leak 33,895 login details of Israeli citizens after breaching several...
Cyber war between Bangladeshi and Indonesian hackers is at peak where hackers from both sides are attacking each other’s cyber space, this...
A Twitter account used by international news agency Thomson Reuters was compromised this week, by hackers affiliated to the Syrian Electronic Army.
The hackers from Syrian Electronic Army have hacked the official Twitter account of New York based multinational media and information firm Thomson Reuters Corporation. After...
Recently, our anti-virus laboratory discovered an interesting new modification of a file virus known as Expiro which targets 64-bit files for infection....
X-ray result of bird detained for spying Last week Turkish authorities had captured a bird suspecting it was spying for Israel, but later...
Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby,...
Earlier estimates of “trillion-dollar” damage to the world economy may have overstated the financial impact of cybercrime, according to a report by...
Just few moments ago the official Twitter account of United Arab Emirates (UAE)’s Foreign Minister Sheikh Abdullah bin Zayed Al Nahyan was hacked...
In two different cyber attacks three official sub-domains of Venezuelan military server (mil.ve) were hacked and defaced by hackers going with the...
A hacker going with the handle of Black-Spy from Turk Hack Team has hacked and defaced 430 websites from different countries around the world....
Last week I reported that the famous and widely used Viber messenger was hacked by some Syrian Electronic Army and they also...
Twitter authorities have been caught doing something unexpected when a Twitter user going with the handle of @Neil_Gottlieb came to know about misuse...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor