Phones such as Samsung’s Galaxy S4 ship with Near Field Communication chips built in - and many companies hope to use these...
Some models of the popular routers made by D-Link contain a “backdoor” which could allow a remote attacker access to settings and...
The “picture passwords” used in Windows 8 machines are more vulnerable than Microsoft hoped, a research team claims. An analysis of more...
Apps with a hidden “dark side” could sneak past Apple’s approval process, according to researchers at Georgia Tech. The researchers proved this...
Up to 900 million devices running Android could be affected by a new vulnerability which would allow cybercriminals “full control” over affected...
Future malware attacks could be triggered by music or even lighting - allowing cybercriminals to command and control large numbers of infected...
Earlier I updated readers with latest vulnerabilities that were found on IndiaTimes and ASK.com by a Pakistani security researcher Danish Tariq, this...
An independent security researcher from Pakistan, going with the name of Danish Tariq has claimed to found cross site scripting vulnerability (XSS)...
A 15 years old independent security researcher from India, going with the name of Indrajeet Bhuyan has claimed to found cross site scripting...
A new Global Center for Cyber Security at the University of Oxford will coordinate international work on cyber threats and cyber security....
Have you ever thought of your digital SLR acting as a spy on you? Well, this wasn’t true before until two German found a weakness in...
A prototype multi-cursor system designed to improve the security of on screen password entry has been posted onto DigInfo, the Tokyo based...
A coal firm in Indonesia named as Bumi has faced heavy crisis in the recent past, but, firm’s physical performance wasn’t the reason behind...
The official website of Syrian Higher Commission for Scientific Research was breached and in result more then 350+ login information was leaked by...
In a study conducted by the researchers at Germany’s Leibniz University, nearly 13,500 which is 8 percent of famous Android apps can be...
Nasa, that is known for its poor security is again under attack. This time Nasa’s Ames Research Center database was hacked and leaked...
Here are some recently released podcasts by ESET Rearchers, addressing current topics such as the recent VeriSign hacks, the takedown of MegaUpload,...
...Andrew Lee conducted a fun but disquieting thought experiment in the course of an amusing and informative presentation on user education at...
Surprised to find annual cybercrime damage spread somewhere between 300 million and 54 BILLION? So is the Director of National Intelligence. Today...
The fifth IEEE eCrime Researchers Summit 2010 once again will be held in conjunction with the 2010 APWG General Meeting between October...
We know that spam works: well, it works well enough for spammers to keep devoting time and money into pumping sewage into...