A Dutch politician could be living his last days at large, as he is facing a sentence of up to three years...
HackerOne is one of the most important vulnerability reporting platforms, so it has access to large amounts of information, although sometimes that...
Elliot Gunton, a UK resident, was first convicted at the age of 16 for breaching the UK telecom giant TalkTalk. He was...
There were many data breach 2016. It seemed like there was a new one in the news every other week during that...
The incident took place in 2014 in which father of a French journalist died of a heart attack soon after prank call...
A group of hackers failed to deploy security mechanisms to secure the storage where they store hacked accounts and another hacker group...
According to ZDNet, a hacker by the name Gnosticplayers reveals to them in February about wanting to put up data of over...
Julian Assange’s lawyers want to see if hacking is protected by the First Amendment. London’s Metropolitan Police arrested Assange on Thursday at...
As a precaution to the risk of getting its election hacked, Australia has to create a special task force that will be...
Sources close to the best ethical hacking institute and the International Institute of Cyber Security (IICS) have confirmed that Kathryn Schrader, Gwinnett...
Criminals have stolen data of Titan Manufacturing and Distributing customers for almost a whole year Malicious hacker groups are attacking manufacturing companies,...
The suspect claimed to be annoyed by recent statements by some of those involved in leaking information According to reports of cybersecurity...
Event-stream Node.js module called is used in millions of web applications, including BitPay’s open-source bitcoin wallet, Copay. This module was reportedly compromised thanks to the...
Computer security vulnerabilities are a threat that has spawned a booming industry, between the heightened global focus on security, and the proliferation...
A Tesla Model S was stolen recently in Essex, England after a pair of thieves hacked the car’s high-tech keyless entry system....
The U.S. has charged and sanctioned a North Korean hacker who is accused of being responsible for the infamous WannaCry Cyberattacks of...
The flaw was found in a completely updated system A cyber security organization researcher has publicly disclosed the details about new zero-day vulnerability present...
A security researcher has demonstrated, at the recent Def Con security conference, that a Mac computer running Apple’s High Sierra operating system...
As the digital world continues to turn, the risk of cyberattack is always on the horizon. And the arrival of the 2018...
Are hackers smarter and more creative than cyber guardians? This is becoming the eternal question of the digital age. While we would...
As we begin to discuss the different phases of a cyber attack, let’s not forget that things are changing drastically as regards...