There are reports of charges to users who had canceled their accounts for months. Hackers have exploited Netflix’s data retention policies to...
It appears that the hackers got hacked this time! According to BBC Russia, hackers have managed to steal data from Russia’s Federal...
Raspberry Pi is a teeny-tiny device that can be tinkered with to gain deceptively high capabilities. This has been proved by a...
A couple of weeks back, news of several of Microsoft’s Outlook accounts being compromised surfaced. It is shocking enough that hackers had...
In an announcement posted on Pastebin, the hacker group TheDarkOverlord told that it has been successful in breaching law firms that handle cases...
This is the third computer error-reporting rewards program launched by the US Armed forces The United States Air Force launched its third...
A flaw in WebEx allows you to access the complete scheme of a company. Some time ago, Karl Fosaaen, an expert in...
Newegg Inc., the leading online electronics retailer, has suffered a massive hack, with credit card data being stolen in large numbers. It...
A group of entrepreneurs hacked the doorbell of their office using services such as Slack, MessageBird and Now Mollie is a technology company...
Hackers from all over the world flocked to the Black Hat 2018 security conference that was held in Las Vegas this week....
WPA/WPA2 protocols are potentially affected by the new hack Enterprise network security researchers have recently discovered a new attack on WiFi (WPA/WPA2) protected...
A researcher specialized in information security training recently discovered an Apple operating system failure that allows anyone with a Lightning cable the...
A joint work of Chinese and American information security professionals found a new method to attack smart personal assistants like Amazon Alexa...
Almost a year ago, on May 4, 2017, information security researcher privately discovered and reported a spoofing vulnerability of the recipient in...
Cisco has issued a critical patch to fix a serious vulnerability (CVE-2018-0112) in its WebEx software that could be exploited by remote...
Icebreaker Automates network attacks against Active Directory to deliver you plaintext credentials when you’re inside the network but outside of the Active...
According to cyber security specialist; a Remote Access Trojan (RAT) is a type of malware that controls a system via a remote network connection...
Fixing the chip security holes Meltdown and Spectre will take a long, long time, but Linus Torvalds and Intel developers are slowly...
One of the biggest names in IT industry, Intel, has verified a report stating that some microprocessors have been built containing flaws...
Recently, Triconex Industries was put at risk when hackers attempted to hack into its security systems, trying to control things. These attacks...
AT THIS POINT, it’s safe to assume that everyone’s been affected by one megabreach or another. But when the next Equifax debacle happens,...