[A shorter version of this article was originally published – without illustrations – on the Anti-Phishing Working Group’s eCrime blog.] Phishing attacks...
Making a mistake on Facebook or other social sites can cost a great deal - either in terms of accidental “oversharing", or...
A self-proclaimed patriot and shadowy hacker has recently launched several cyber-attacks against Ecuador and has also made the statement that such attacks will...
The official website of Bangladeshi Department of Immigration & Passports (http://www.dip.gov.bd) was hacked and defaced by the group of Saudi hackers getting famous with...
Game publisher Ubisoft has fallen victim to a website hack, which exposed data including email addresses, user names and encrypted passwords.
Atlantic Media CTO Tom Cochran emailed employees a fake phishing email supposedly from “Google Apps”, and found that 58% clicked the link.
The official website of US Air Force Culture & Language Center () has been hacked, as a result highly sensitive personal details of...
An Indian hacker going with the handle of Assassin has hacked into the email system of Pakistan’s Quaid-e-Azam University ), as a result...
Thing are getting worse for Snowden as Brazil and India have refused asylum request from former NSA’s whistle blower Edward Snowden’s today. The officials...
The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit....
Cybercriminals have targeted U.S. energy companies with a wave of brute force cyber attacks, according to the Industrial Control Systems Emergency Response...
The NSA whistle blower Edward Snowden who is in Moscow these days has made a new statement which has been published by Wikileaks. ...
The anti-secrecy non-profit organisation Wikileaks which publishes secret information, news leaks, and classified media from anonymous sources has published an application request that...
A supporter of Anonymous hacker going with the Twitter handle of @RunaGalande has claimed to hack and breach the official website of Turkish Finance Ministry...
In the state of Punjab, India, 170 cyber-crime complaints have been made in total and the state has topped the chart of...
People who are using a different telephone apps on their cell phones need to be cautious, as a researcher has indicated vulnerabilities...
Bitcoin is not the only crypto-currency targeted by malware now that a Trojan designed to steal Litecoins has been discovered. In this...
Every month, around 70 sophisticated cyber espionage campaigns target government or industry networks, Sir Iain Lobban, head of Britain's GCHQ spy agency...
The officials at South Korean Presidential office have said that official website of S.Korean President (english.president.go.kr) was hacked on Monday last week, as...
Instagram users were bombarded with pictures of fruit over the weekend in a spam attack that swept the photo-sharing network.
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan