Anonymous has leaked personal details of CEOs, managers and other employees of hotshot companies in Italy to protest against the new labour...
We’ve discovered a new family of iOS malware that successfully infected non-jailbroken devices we’ve named “AceDeceiver”. What makes AceDeceiver different from previous iOS...
Hackers state that electronic voting machines in Brazil are deliberately flawed with serious vulnerabilities The electronic ballot boxes are controversial in Brazil,...
The Russian security tester Timur Yunusov has discovered critical flaw affecting routers and 3G and 4G mobile modems from Huawei, ZTE, Gemtek,...
Short Bytes: The security firm Avecto has just released its security report on Windows operating system. The report outlines an important result...
Image: Wtamu.edu Short Bytes: A report published by Mathew Sag claims that the number of people sued for illegal file sharing in...
A hacker with Google Project Zero research team, publicly disclosed critical vulnerabilities in the TrendMicro Antivirus. Tavis Ormandy, a researcher with Google’s...
Stealing PINs and pillaging bank accounts are both trivial. Credit card users could have their PINs stolen, and merchants could have their bank...
Short Bytes: The French government is actively researching the options to make its surveillance options more effective. In the wake of recent...
NSA discloses 91 percent of the zero-day bugs it finds in the online systems to its manufacturers while it keeps the 9...
Some consumer-grade, self-encrypting external hard drives are littered with security vulnerabilities that render their encryption an afterthought. An academic paper published in...
Security flaws have been found in drones that could allow hackers to target and attack the flight controller which includes numerous sensors...
China’s “Great Firewall” may have been partly to blame for the first major attack on Apple Inc’s (AAPL.O) App Store, but experts...
To benefit the hard-working app developers and programmers, Amazon is starting a cloud-based service named AWS Device Farm. AWS Device Farm will...
Governments unsurprisingly are trying to buy unpatched security exploits in the name of surveillance or cyber defence but refrain from admitting it....
Summary: New surveillance laws will be formed to force the leading Internet firms such as Apple, Facebook and Google to hand over encrypted...
The British government has passed legislation amending the Computer Misuse Act to prevent GCHQ, the police and intelligence services from prosecution over...
JUDGE SLAPS FACEBOOK WITH PRIVACY VIOLATION RULING. U.S District Judge Phyllis Hamilton ruled thatFacebook must “face the consequences” of violating its...
Belkin’s WeMo home automation systems contain multiple vulnerabilities which could allow attackers to remotely control devices attached to a WeMo system -...
If your system administrator looks a little frazzled this week, be nice to him or her and don't grumble too much about...
The Turkish parliament has accepted a highly controversial reversal to a cyber law, granting authorities full power to block certain websites in...