Report Hints on Possible Invading of TORMail users Privacy for Capturing Global Child Porn Gang by the FBI In 2013, the Federal...
If you receive an email claiming to have a ”new message” from Facebook just delete it because the attachment contains Nivdort malware...
The hacker inserted a Trojan malware into Cryptsy’s code so that he could access precious information and transfer cyber currencies. Paul Vernon, also...
Short Bytes: A young Turkish hacker namedOnur Kopçak was sentenced to 334 years in prison. The cyber criminal was convicted for credit...
FBI has taken down a site involved in Child pornography through some hacking techniques that have never been used in the history...
Bitcoin-for-DDoS extortion scheme has a new victim and its none other than the BTCC — However, the hacker was unfortunate this time...
Palo Alto Networks researchers have identified a unique malware that infects home PCs and transforms them into internet proxies using HTTP tunnel....
With 2016, just a few days away, let’s have a flashback of the top 15 security incidents that took place this year....
After using malware on pedophiles, law enforcement authorities in the United States have decided to add Hard-Drive Sniffing Dogs in their units...
Last week HR reported about a hacking group “Phantom Squad” that is planning ruin holidays for the gamers. It looks like the...
Each day we hear about new phishing attacks being carried out by hackers or scammers and despite the continuing awareness from multiple...
Summary: Malware is increasingly sophisticated. In 2016, look for two developing malware families. First, as law enforcement becomes more specialized in identifying...
Last New Years Eve, a hacking group “Lizard Squad” spoiled the party for gamers with a DDoS attack on the Play Station...
There are a hundred types of malware hidden inside the Bible and Quran apps, most of which are available all over the...
British government’s new investigatory bill (pdf) has a proposal on making it legal to hack smart toys in order to allow investigators to...
An article published by The Guardian in 2011 on the topic Cybercrime: is it out of control? received a nasty response from a...
Some unknown cyber criminals have attacked a publicly funded network “Janet” which was used by many universities throughout the United Kingdom. On...
TuneCore, an online music distribution/record label service on Friday, revealed that its database was breached by the hackers and they have been...
People who download stuff from torrents and other cracked software providing websites have a very bad news because a user recently downloaded...
If your browser displays unwanted and wrongly placed ads such as an adult website ad on a website for kids or showing...
Will Canada’s new Cybercrime division Curb Cybercrimes and capture Anonymous? Since the approval of Canadian Anti-Terror Bill C-51, online privacy is in...