Every app installed on your smartphone with permission to access location service “can” continually collect your real-time location secretly, even in the...
A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often...
Developers of Drupal—a popular open-source content management system software that powers millions of websites—have released the latest version of their software to...
Exclusive — A security researcher has identified an unsecured server that was leaking detailed personal details of nearly half a million Indian...
Beware Windows users… a new dangerous remote code execution vulnerability has been discovered in the WinRAR software, affecting hundreds of millions of...
Exclusive — If you have not updated your website to the latest WordPress version 5.0.3, it’s a brilliant idea to upgrade the...
How do you know whether an attacker has infiltrated your network? Can you really rely on an Endpoint Detection and Response (EDR)...
Why would someone bother to hack a so-called “ultra-secure encrypted database that is being protected behind 13 feet high and 5 feet...
It’s 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any...
Wohooo! Great news for hackers and penetration testers. Offensive Security has just released Kali Linux 2019.1, the first 2019 version of its...
It’s not at all surprising that downloading movies and software from the torrent network could infect your computer with malware, but it’s...
Before smartphones were popular, people didn’t take mobile security much seriously. After all, we used to have a few contacts, some classic...
How do you check if a website asking for your credentials is fake or legit to log in? By checking if the...
A hacker who was selling details of nearly 620 million online accounts stolen from 16 popular websites has now put up a...
The United States Department of Justice has announced espionage charges against a former US Air Force intelligence officer with the highest level...
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing...
Cybersecurity researchers have discovered a way to hide malicious code in Intel SGX enclaves, a hardware-based memory encryption feature in modern processors...
Ubuntu and some other Linux distributions suffer from a severe privilege escalation vulnerability that could allow a local attacker or a malicious...
What could be more frightening than a service informing you that all your data is gone—every file and every backup servers are...
Welcome back! Adobe has today released its monthly security updates to address a total of 75 security vulnerabilities across its various products,...
A new security vulnerability has been discovered in the latest version of Apple’s macOS Mojave that could allow a malicious application to...