One Ukrainian and 4 Russians have been charged by a US court for stealing more than 160 million numbers of credit cards...
It took Indian army six months to realize that “Chinese spy drones” they have been spying on for violating their cyber space were actually...
Many people leave phones and tablets “open” to criminals - both the cyber variety, and the ordinary, non-cyber kind. Our tips should...
Two researchers are to demonstrate a “hack” that allows control over automobile systems including brakes and steering in models by Ford and...
A new study aims to identify the sort of people who are most likely to fall for phishing scams - and has...
Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.
A fiber-optic tabletop PC system “reads” fingerprints as people use it - and could form the basis of a secure system for...
The popular messaging app Tango has been hacked - and hacker group Syrian Electronic Army (SEA) claims to have accessed “millions” of...
Deface page left by the hacker on Viber website The hardcore pro- Bashar Ul Asad hackers from Syrian Electronic Army have hacked and...
The PIN codes used to protect smartphones offer a useful line of defense against criminals - unless, that is, your device falls...
If you thought NSA was only spying over your online activities, then add this one to your list because NSA has full...
An inside screenshot from The Daily Dot’s admin panel The Syrian Electronic Army has hacked into the official website of an Online...
Passwords are outdated and “inevitably” fall into the hands of cybercriminals, according to a new advocacy group, Petition Against Passwords.
Around 750 million SIM cards that are being used in mobile phones contain a specific programing flaw which makes the cell phones...
An Apple developer website was hacked last week, and has remained offline for days after an attack which Apple admits may have...
Spotting “bad” apps on Android is not always easy - with cybercriminals finding new tricks every month to fool phone and tablet...
Millions of SIM cards in use today are vulnerable to hacking - allowing for attacks where SIM cards could be cloned remotely,...
Two Pakistani hackers going with the handle of Xploiter and Dr.Freak from PakBugs hacking group have hacked and defaced the official website of Tameer Microfinance...
I am breaking this news for you that operating system Ubuntu has got its forum hacked as a result of a breach...
The Syrian Electronic Army has breached into the official website of Tango (Tango.me) a popular mobile messaging service based in Mountain View, California. Hack...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage