You may remember Google’s Safe Browsing Site Status mistakenly marking Google.com as a potentially dangerous domain to visit or the Google Maps mistakenly labeling...
Windows’ system files were flagged as malicious, and Facebook was marked as a phishing site. A malware signature update issued by the...
Malware specialized in infecting Point of Sale (PoS) software has gained the ability to search and steal driver’s license information, according to...
One of the officers of UK’s Metropolitan Police Service was caught in possession of a malicious software used for infecting computers and...
Interpol investigators announced today they’d identified over 8,800 servers hosted across eight countries in Southeast Asia used for various cybercrime operations. According...
A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled via scanners....
Short Bytes: FBI has arrested a DevOps Engineer Zhengquan Zhang for stealing proprietary source code and accessing employee accounts at KCG Holdings...
Short Bytes: In their latest revelation, Wikileaks has released a user guide describing the working of the Weeping Angel tool designed by...
Short Bytes: A security firm called Zscalar spotted a malicious app living on the Play Store with a false moniker System Update....
A few months earlier, it was reported that a number of InterContinental hotels have been targeted by a credit card stealing malware...
The BankBot Android banking trojan is giving Google engineers headaches, as this particular piece of malware has a knack for avoiding Google’s...
[jpshare]Ransomware for Android, or any mobile platform, have been generally uncommon.The risk has fundamentally been kept to Windows desktops, where it’s flourished...
Thanks to ex-NSA spy, Edward Snowden, we all know that Governments use several hacking tools and malware to spy on public and...
[jpshare]Security researcher Niels Croese found much new banking malware on Google Play, which has numerous new banking application focuses in its configurations. Taking a look...
Earlier this week, Spanish authorities arrested a Russian hacker and “one of the world’s most notorious criminal spammers,” Peter Yuryevich Levashov (Severa)...
Short Bytes: A team of Symantec researchers has been able to link around 40 cyber attacks, conducted by Longhorn group, to the...
You might have heard countless tales of hackers using malicious ransomware forcing users to pay huge amounts of money but not today....
Researchers have detected a new zero-day bug which uses a previously unknown flaw in Microsoft Word. The bug allows attackers to send malicious document...
Short Bytes: The latest addition to the Vault 7 leak by CIA is the set of 27 documents of the Grasshopper framework....
[jpshare]Security Experts from Avast came through a Malware that uses a sandbox(DroidPlugin) to dynamically load and run an app, without actually installing...
You may remember Shadow Brokers hacking group for selling a trove of hacking tools and exploits stolen from the NSA’s Equation Group...