Kaspersky said they found backdoors in the updates pushed by the ASUS update server, They also said that it’s been happening for at least...
1. TRITON Malware Security researchers have uncovered another nasty piece of malware designed specifically to target industrial c...
The increasing amount of data in various digital forms and the desire to have access to it from various devices has increased the importan...
WhatsApp rolled out end-to-end encryption feature for all its users in April 2016. As a result, all the calls, messages, multimedia files ...
What is Ransomware ? Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption...
British 15-year-old gained access to intelligence operations in Afghanistan and Iran by pretending to be head of CIA, court hears
January 20, 201815-year-old gained access to plans for intelligence operations in Afghanistan and Iran by pretending to be the head of the CIA to gain acc...
A US court has allowed the Federal Bureau of Investigation (FBI) to keep secret the information regarding the tool that was used to hack i...
In 2015, Israeli government hackers saw something suspicious in the computers of a Moscow-based cybersecurity firm: hacking tools that cou...
Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking grou...
Moscow-based antivirus software maker Kaspersky Lab said on Wednesday that its security software had taken source code for a secret ...
Security Flaw in LG Smart Ovens Could Have Allowed Hackers to Remotely Activate Them: Check Point
November 13, 2017A security flaw in LG's smart home devices gave hackers a way to control the household appliances of millions of customers, including ...
Eugene Kaspersky said his company's widely used antivirus software has copied files that did not threaten the personal computers o...
It was recently discovered through a Reddit post that the notorious Phishkingz Drak Web user has finally had a taste of his own medicine...
Experts have recently discovered a major new botnet hackers have created and named Reaper. Similar to another event that took place in...
Cyber criminals have once again launched a ransomware attack on android based phones. Look out for a compromised Adobe Flash Player app ...
Researchers at ESET, a popular cyber security software, discovered the Elmedia Player download has been laced with Proton malware so...
A recent study conducted by the Cyber Security Research Institute (CSRI) this week revealed that stolen digital code-signing certifica...
Hackers Distribute Backdoored IOT Vulnerability Scanning Script to hack Script kiddies
November 13, 2017Now, a security researcher has spotted another hacking tool—this time a PHP script—which is freely available on multiple popular undergrou...
Back in September 2017, Positive Technologies’ experts had expressed interest in the development of a technique that can attack the yet se...
What is Phishing? Phishing is a type of social engineering attack often used to steal user data, including login credentials and credi...