John McAfee, noted liar and one-time creator of anti-virus software, apparently tried to convince reporters that he hacked the encryption used on...
A teen hacker has taken over PornHub servers and sold the data for $1000 — PornHub claims it’s just a hoax! The famous adult...
Proofpoint researchers have recently observed the re-emergence of two malware downloaders that had largely disappeared for several months. Hancitor (also known as...
Attackers can score user privileges thanks to heap corruption hassle Some of the world’s biggest security and software vendors will be rushing...
Yahoo mail Hammered by Congress for its Inefficiency in Preventing Phishing Attempts Symantec’s newest threat report claims that email phishing scams have...
The famous adult content website Pornhub has decided to let hackers report security flaws and vulnerability on its computer system and earn...
Viking Horde malware gains root access of any Android device — It can steal your personal data, conduct DDoS attacks and ad frauds....
Short Bytes: Jaku Botnet discriminates while targeting its victims in the wild. It is easier to download from the famous sources like images...
We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on...
Researchers have identified a new malware taking advantage of Windows God Mode and infecting users. Malware in a Window OS is not...
The malware is targeting Russian users but it’s about time when the same tactics will be used by other cyber criminals outside...
Our research team has recently seen a large amount of activity in our cloud related to an Android infostealer disguised as a...
Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that acts as...
The US government hired an insider to help it with the anonymous browser Tor. Tor is used by millions of people around...
How does the U.S. government beat Tor, the anonymity software used by millions of people around the world? By hiring someone with...
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a...
Unknown group attacked South East Asian targets, sometimes for years at a time. Microsoft’s Windows Defender Advanced Threat Hunting team works to track down...
Windows comes with a tool called the Windows Management Instrumentation, or WMI, that can be used by system administrators to receive information...
The hackers behind a large-scale Bangladesh bank hack went further than simply stealing money. Now it turns out that they created malware...
Has Google Admitted that it is a source of Malware? — Yes indeed! ? Google.com has become a potent source of malware...
This bug bounty hunter hacked Facebook but soon realize there’s something fishy going on A hacker taking advantage of Facebook’s bug bounty...