Answers to common questions about tax season scams in America and advice about fending off the malicious activity that seeks to exploit...
Matthew Keys who is the deputy social media editor of Reuters has been recently charged for being involved in an anon attack...
The hackers from Syrian Electronic Army have hacked and defaced the official website of Human Rights Watch (HRW) (www.hrw.org) along with 3...
It is not being taken as a surprise in this modern world of hacking that Princess Diana might have been the first...
Hackers from Syrian Cyber Eagles group have claimed to hack and breach the website of Privacy Corps (www.privacycorps.com), famous for its products...
An Egyptian ethical hacker Virus_Hima who got famous after founding vulnerabilities in Adobe and breaching Yahoo server, last year; is back with another detailed report...
UPDATE: Earlier I reported that Saudi Commission for Tourism and Antiquities website was defaced by Syrian Cyber Eagles with the help of Crazy-3r3r....
Hackers from Moroccan Ghosts have hacked 152 Spanish websites in protest against alleged killings of 7 Moroccan immigrants while entering into the Spanish territory...
Just two days ago, I wrote about a hack in which 63 Chinese government websites were defaced by a hacker using handle...
Earlier, I wrote a preview on Samsung Galaxy S4, now phone has been finally launched and as usual has found some critics and...
An unknown foreign gambler at a casino had hacked security surveillance cameras in Melbourne’s biggest scam at the Crown Casino. HeraldSun reports...
The computer network at Polish presidential office has been breached by hackers trying to spread a malicious malware through an email attachment....
The official website of Total Nonstop Action (TNA) wrestling (impactwrestling.com) along with its Facebook and Twitter accounts have been hacked by a professional wrestling stable Aces &...
Hackers from Syrian Electronic Army known for their hardcore support for Syrian President Bashar Ul Assad are back with another high profile hack, this...
According to a survey by technology industry analysts Gartner, the adoption of mobile devices is happening even faster than expected.
A survey of UK consumers, sponsored by telecoms supliers Avaya and Sabio had some worrying results for the financial sector.
Even the smallest web based business in the world will attract criminal hackers interested in stealing financially valuable data.
While many Android users speculate about Google's removal of ad-blocking apps from the official Android store, Google Play, we consider the risky...
MatthewKeys, a social media editor at Thomson Reuters Corporation has been accused of allegedly conspiring in the hacking and helping Anonymous hackers with login details of his former employer the...
A hacker from Anonymous Algeria, going with the handle of Charaf Anons from Algeria has hacked and defaced total 63 Chinese Government owned...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage