A group of Anonymous hacker has said to hack into a server used by Federal Emergency Management. According to them, the data...
“Children are a formidable adversary - unlike any other,” says Microsoft security researcher Stuart Schechter, in a paper to be presented at...
More than half of securities exchanges around the world faced cyber attacks last year, according to a paper released by the International...
Government agencies in India are now allowed to access your blackberry devices directly, allowing them to track conversations, emails and attachments sent...
Syrian hackers known for their hardcore support for President Bashar Ul Assad from Syrian Electronic Army are back in news, this time...
There are a few tricks to making passwords that will at least slow down cybercriminals - buying you time to reset your...
Micro-blogging site Tumblr has warned users that passwords can be “sniffed” from its iPhone and iPad apps - and issued a “very...
A Texas restaurant chain is suing one of its suppliers over a point-of-sale system which allowed hackers to steal customer data -...
A $250 signal-boosting device for cellphone users can be hacked, two researchers claim - offering total access to phone calls, internet use...
Browser security warnings can work to protect users from phishing and malware sites - but “warning fatigue” means important alerts over site...
A new biometrics system could “read” blood vessels under the skin using thermal imaging cameras - a system which its inventors claim...
LulzSecPeru known as one of the most skilled online hackavists are back, this time by the hackers have hacked and defaced the...
The well known Turkish hackers from Turkish Ajan hacking group have hacked into the official website of Sony Electronics (web.sony.it) designated for...
Microsoft has collaborated extensively with the intelligence services of the United States to allow users’ communications details. The company even helped the...
Cyber risk has shot up in importance for company CEOs and senior executives, according to an Ipsos survey for Lloyds Risk Index...
A Kremlin security agency has ordered $15,000 of electric typewriters - sparking international gossip about a return to “old school” security measures.
The Russian newspaper “Izvestia” reported on Thursday that the Federal Protective Service of the country bought 20 typewriters to prevent sensitive information...
A group of hackers claiming to have roots in Afghanistan going with the handle of Afghan Cyber Army has hacked and defaced six...
Governments around the world are recruiting “cyber-mercenaries” - groups of skilled cyber professionals who target institutions such as banks and energy companies,...
“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment