Hacking baby monitors is nothing new but the fact that there are thousands of vulnerable baby monitors out there is a big concern....
Another day, another malware – This time it targets macOS and it comes with keylogging capabilities. Security researchers have discovered a malicious...
Flight Simulator Lab is caught secretly installing a software which steals Chrome passwords from the browser while checking if the user has...
Apple and its much-hyped APFS or Apple File System have been under hot waters lately as the fateful APFS has been diagnosed...
Looking for which cyber security certifications you should get your hands on? Here are 5 certifications that will boost your salary in...
In October 2017, Gavin Paul Prince, 37, chief executive of VeriLet, a tenant eligibility service, was accused of five crimes including the...
It is just another day with just another privacy invasion – This time it is FedEx whose customer data has been exposed...
Facebook’s Onavo VPN app the essence of situational irony – invading while claiming to protect privacy. Facebook has begun releasing a controversial...
The IT security researchers at McAfee have discovered that the Lazarus Group aka Hidden Cobra is back in action busy targeting global banking...
A hacker who found critical vulnerability in Canadian Freedom Mobile has no downloaded the customer data and warned the company to put proper...
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique...
Problems for Washington Marijuana Industry Twofold After New Marijuana-Tracking Software Hack. The pot industry in Washington has suffered massive setback after the...
The Winter Olympics Games Organizing Committee is investigating a cyber attack on the event’s Internet and Wi-Fi system. The attack was carried...
Another day, another incident involving people mining Bitcoin cryptocurrency illegally – This time, it is none other than Russian scientists. The Interfax...
Apple has been going through a rough phase lately and now the company is in hot waters again since the baseband source...
Ledger hardware wallet that is currently operating in the cryptocurrency market is vulnerable to cyber attacks. The vulnerability was identified by unknown security...
Forget WannaCry and welcome WannaMine, a fileless cryptojacking malware using leaked NSA exploit called EternalBlue. We cannot ignore the fact that cryptocurrencies are...
Hackers can exploit security flaws in ManageEngine software to gain administrator type control of the system. Digital Defense Inc., a San Antonio based IT security...
Vulnerability in Lenovo Devices Allows Attacker to Bypass Fingerprint Authentication and Gain Higher Privileges. In case you own a ThinkCentre, ThinkPad or...
Strava is a GPS tracking and fitness-tracker app manufacturer that is currently making headlines for introducing the Global Heat Map, which relies...
Did you visit YouTube from January 18th to January 26th? There is a chance your browser was used by hackers to generate Monero cryptocurrency. Since...