Shadow Brokers hacking group is claiming that it hacked NSA’s Equation Group and stole a trove of hacking tools and exploits! Hackers are...
Believe it or not, your Solar Panel can be hacked as well — Just like this man who hacked his own solar...
Another day another hack: This time it’s the Phoenix, Arizona-based Banner Health. Banner Health, a non-profit healthcare organization suffered a massive data breach...
SafeDNS’s slogan is Secure Internet for Home and Business — Now the firm has come up with a new system that will...
No More Ransom is a project to help and protect victims of ransomware attacks — Thanks to Intel, Kaspersky, Europol and Dutch...
A few months ago, United States General Vincent Brooks warned the Senate about the growing threat from North Korean cyber-attacks, saying, “While...
Walter O’Brien is a well-known name in the world of computer and cyber security. Although he is famous today as the founder...
Mitsubishi’s Outlander Hybrid Car’s Alarm Vulnerable to Hack due to Wi-Fi access point issue Researcher and security expert Ken Munro has revealed...
If you are an IT security researcher or a hacker and living in the Michigan State you may consider to move somewhere else...
PwnedList is a tool that allows an average person to check if their accounts have been compromised — The company has decided...
This bug bounty hunter hacked Facebook but soon realize there’s something fishy going on A hacker taking advantage of Facebook’s bug bounty...
Kaspersky Lab’s Researcher Proves How Easy it is to Tamper with Moscow’s Traffic Sensors Thankfully, researchers of our age are not only...
While you might think that what a Russian APT group does to attack Ukrainian infrastructure has little to do with the life...
Internet Connected Sex Toys Vulnerable to Hacking — Hackers can not only remotely control smart sex toys but also record videos and...
Hackers state that electronic voting machines in Brazil are deliberately flawed with serious vulnerabilities The electronic ballot boxes are controversial in Brazil,...
The reporter from USA Today claims his fellow passenger hacked his email during the flight while he was working on an article about...
Security researchers show how an attacker can access Nissan Leaf electric car by exploiting vulnerability in APIs By using the Application Program...
The internet is abuzz with news about a new backdoor Trojan that is equipped with such advanced features that it can steal...
Millions of LG G3 smartphone users are at risk of losing critical personal data due to a severe security weakness dubbed as...
A new Linux malware has been discovered which aims to help criminals steal data and spy on the PCs of infected users....
Palo Alto Networks researchers have identified a unique malware that infects home PCs and transforms them into internet proxies using HTTP tunnel....