Hackers could remotely attack security cameras commonly used in banks and prisons - and either spy on secure facilities or replace “real”...
Microsoft has said that it has “liberated” two million PCs worldwide from Citadel botnets after an action on June 5 which targeted...
According to the recently leaked document from NSA by the Guardian, the U.S government is spying each and every conversation done by...
A hacker going with the handle of X-Blackerz Inc, supporting Anonymous hackavists on #OpIsrael has hacked into the server of an Israeli based hosting...
Cyber attacks are damaging the world economy, a former White House official has warned, and leading economies need to put aside political...
An Anonymous hacker going with the handle of @ItsKahuna on Twitter from Ohio is all set to confess the cyber crime for which...
Medical devices including heart defibrillators, patient monitors and anaesthesia devices include a dangerous password vulnerability which could be exploited by cyber attackers,...
Google claims to have spotted and disrupted several phishing campaigns in Iran - attempts to compromise tens of thousands of email accounts...
A new era of secure passwords could be upon us with a facial password system that can unlock phones using facial expressions...
Facebook has announced that it will now introduce clickable hashtags on the social network. Thus, the site will function as the Mark Zucerberg...
A Saudi hacker going with the handle of Dr.TaiGar from Group Hp Hack has hacked and defaced the official websites of United Nation and United Nation...
A group of Indonesian hackers from Biang Kerox Team have hacked and defaced 127+ Israeli based websites. Team left their deface page along...
The “sophisticated” malware for Android has been “unleashed”. Identified by the company specializes in cyber security Kaspersky, the Trojan “Backdoor.AndroidOS.Obad.a” is a threat virtually impossible to be...
An Algerian hacker going with the handle of DZ27 has hacked and defaced two sub-domains of Saudi Arabian Ministry of Higher Education (mohe.gov.sa) four days...
Newly formed government of Pakistan has issued a warning to world’s largest search engine Google to remove blasphemous content from Youtube or...
A computer malware has been found on Facebook that is smart enough to empty your bank account by taking out money from...
Banks should look to spam emails and their own server errors as a source of information, says Nicholas Scott of National Australia...
Just an hour ago a well known Anonymous hacker going with the handle of @AnonsTurkey on Twitter has hacked into the official websites of...
British Prime Minister David Cameron has been warned that telecoms equipment made by Chinse firm Huawei should be tested by security services...
Microsoft and the FBI have broken up a large portion of the Citadel botnet - a network which had stolen $500 million...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan