Adobe Flash Player has again seen a zero-day exploit that has appeared in the field due to a critical vulnerability that enables...
Facebook appears to be infected with a porn-based malware that has affected about 110,000 Facebook users in just two days. The malware,...
This news bit strengthens the presumption that hackers can make use of just about anything to fulfill their malicious motives. After the...
A website mimicking the official BBC News site has garnered immense traffic earlier this week through false information about Charley Hebdo massacre...
Unknown hackers have hacked the computer systems of South Korea’s nuclear plant operator and leaked noncritical data claim the officials. The targeted institution was Korea...
Researchers from Blue Cat Labs are calling it the Inception attack framework, in reference to the movie “Inception” where a thief entered...
Electronic cigarette manufacturers may have highlighted its numerous benefits to letting you lead a healthy, stress-free life, what they certainly did not...
Apple is usually known for its top notch security but a US-based cyber security software developer Palo Alto Networks discovered a new...
Unclassified White House computers are latest in the list of security breaches this year and the prime suspects for the breach are...
A new malicious campaign has been identified by security researchers spreading fake news about the Ebola virus, in order to redirect users...
A common shortcoming that most of the USB devices possess is one which can be noiselessly made use of to introduce infection...
Security experts at Dr. Web have warned Android users to be careful with a new Trojan that is stealing credit card details while...
Cyber criminals have targeted millions of Facebook users through a sophisticated Android Trojan app that can bypass the two-factor authentication shield used...
Google’s latest update on Monday only highlights how apathetic they are to the privacy of their users and consider every bit of...
Spammers are taking advantage of the various online petitions against the recent news about the alleged arming of the Syrian rebels by...
A security firm has revealed that hackers are targeting companies utilizing services of Monster Jobs, a well-known job portal, through a new...
Nathan Collier of Webroot ThreatVlog, talks about an old, but still active, SMS Fake Installer, a Russian based program used to trick...
During recent times, social media has by some distance defeated ordinary ways of trading. This has indeed directed many people towards social...
The “sophisticated” malware for Android has been “unleashed”. Identified by the company specializes in cyber security Kaspersky, the Trojan “Backdoor.AndroidOS.Obad.a” is a threat virtually impossible to be...
Mobile phones are now also being utilized for the purpose of managing some important personal assets such as money. According to a...
MAJORITY OF THE JAVA ENABLED BROWSERS ARE ASSAILABLE TO JAVA EXPLOITS WHICH HAVE BEEN SPREAD ON A VAST SCALE: SAYS WEBSENSE Majority...