Cybersecurity researchers have revealed an unpatched logical flaw in Microsoft Office 2016 and older versions that could allow an attacker to embed...
It’s been quite a year for the open source platforms. Earlier this year, Microsoft acquired popular code repository hosting service GitHub for...
Microsoft Windows built-in anti-malware tool, Windows Defender, has become the very first antivirus software to have the ability to run inside a...
Canada has apparently imitated European Union’s GDPR, that is the latest news from the country’s Office of Privacy Commissioner of Canada (OPC)....
An Indian security researcher has discovered a highly critical flaw in X.Org Server package that impacts OpenBSD and most Linux distributions,...
The North Korean government, as per a new report, has sponsored at least two cryptocurrency scams this year. Recorded Future, the cybersecurity...
Facebook has finally been slapped with its first fine of £500,000 for allowing political consultancy firm Cambridge Analytica to improperly gather...
When it comes to security updates, Android is a real mess. Even after Google timely rolls out security patches for its Android...
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the...
A security researcher with Twitter alias SandboxEscaper—who two months ago publicly dropped a zero-day exploit for Microsoft Windows Task Scheduler—has yesterday released...
Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players,...
While cyber attacks occur almost daily in the world, sometimes with catastrophic results, we do not hear about successful attempts of disrupting...
Pentagon, the center of defense of the world’s only superpower: The United States of America embarrassingly admitted that the organization is one...
Cybersecurity is the responsibility of everyone, as the weakest chain in the link is human-computer operators. Cybercriminals have an easy time to...
At the turn of the new century, 2000 AD, the dependence of people and companies with technology has been integrated than ever...
Due to the diligence of the cybercriminals with their research and development of malware, from time-to-time, new words are introduced in the...
Aspire Health, through its federal court record, has revealed that it was a victim of a nasty phishing attack through email that...
The business of IT comes with its own strength and weaknesses. The job of system administrators is usually only seen with a...
The popular culture has depicted hackers as evildoers in movies, in TV series and even in the primetime news. However, the commodification...
When it comes to cybersecurity then no any business would be able to ignore it! In fact, if we consider the reports...
Russian-speaking hackers are linked to the theft of 800k USD from European banks At least one of the members of a newly...