Isis supporter compromised Chile’s Ministry of Defense website on Monday night and left a message “Hacked” on its homepage, www.ssdefensa.cl, along with...
Remember Lizard Squad? Yes, the same Lizard Squad who shutdown PSN and Xbox Live last Christmas making the holidays one living hell for games....
Women Stalked by Security Guards via CCTV – “Sleaze File” contains images of pretty women Five security guards of a high-profile shopping complex...
The US surveillance agency, National Security Agency (NSA) along with its British counterpart the Government Communications (GCHQ) has compromised one of the...
It is somewhat a proven fact that Computer & Internet have brought a new era of productivity into the human life in...
Hackers have breached the billing and payment pages of BigFish Games and stolen sensitive information, according to the company’s notification letter published...
The official verified Twitter account of WWE superstar Antonio Cesaro (@WWECesaro) was hacked earlier Tuesday by unknown hacker wishing cancer to the company’s Chairman and...
Visa, famed payment processing company, will be rolling out its new software with location-tracking capabilities this summer. It will allow banks to...
On 14th February, 2015, when people were busy celebrating Valentines day; the ISIS hackers were busy targeting UAE’s oldest Arabic language newspaper Al...
If by any chance, you have been into a local police department for filing a public request in order to know about...
Email titled “My New Photo ;)” actually Contain Malware – A .Zip file has an attachment Supposedly containing the promised image. Summary: Hackers,...
According to a study by Alcatel-Lucent’s Motive Security Labs, users around the world are being spied upon by extremely sophisticated mobile malware...
A project had been announced by the U.S government’s Defense Advance Research Projects Agency (DARPA) last year which was to create a...
Search-Lab Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is...
DEA Maintaining Massive database of the country’s drivers and vehicles’ number plates – Database is used by DEA to track car owners. In...
Hackers pieced together zero-day vulnerabilities in Flash and Internet Explorer 9+ to attack financial services and defense contractor employees visiting Forbes.com, according...
A security researcher has revealed from a research of various data breaches, a collection of 10 million usernames and passwords. The leaked...
The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10. Kali Linux 1.1.0 was...
Samsung decision to process voice commands in its latest Smart TV through cloud server has sparked a new debate on data retention,...
Remote Control Virus was used by the Hacker to Penetrate into Computer Systems and issue death threats to users. On Wednesday, the...
The person who developed the free email encryption software Gnu Privacy Guard in 1997, which was used by famous NSA whistleblower Edward...