Two Russian Nationals were given US federal prison sentences for their respective roles in a 2013 data breach which compromised

Any individual or company is at risk of a cyber-attack and without the right protection in place, any computer or

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of

Security researchers have discovered a custom-built piece of malware wreaking havoc in Asia for several months that could signal the

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could

DCShadow attack allows installation of backdoor. Hackers could set up their own fake domain controller in an existing corporate network

Autosploit, a new tool that basically couples Shodan and Metasploit, makes it easy for even amateurs to hack vulnerable IoT

S4x18 CONFERENCE – Miami – Industrial control systems giant Schneider Electric discovered a zero-day privilege-escalation vulnerability in its Triconex Tricon

Cryptocurrency miners have begun using two older and already patched vulnerabilities to compromise servers to mine the Monero digital currency.

Several universities and more than 20 companies have been hit with malware whose creators are using several layers of subterfuge

Nexus Zeta behind botnet that weaponises router exploit to enlist further vulnerable IoT devices. The author of Satori botnet may

Despite facing mostly external attacks, nearly half (45%) of businesses believe their greatest security risk comes from their own employees,

Attackers have made off with up to US$400,000 (£290,000) in cryptocurrency after an ingenious attack on Stellar Lumen (XLM) wallet,

The company trying to be the Google of hacked user credentials says it just obtained another huge leak, this time

Researchers have found a loophole in Intel processors that allow an attacker to bypass logins and place backdoors on laptops,

The malware, dubbed OSX/MaMi by Wardle based on a core class named “SBMaMiSettings,” is currently only detected – at least

OPCDE : short for operational code, it is a number that determines the computer instruction to be executed. The most

Join Fran Malloy, IBM Security Technical Sales Management and former CISO of a Fortune 500 company, as he shares an

Technology adoption is bringing about massive change in major cities around the world from smart traffic lights to knowing exactly

Ransomware & malware multiply Ransomware has been a cash cow for criminals, as well as a disguise for more destructive

Attackers continue to exploit a recently patched remote code execution vulnerability in the Microsoft Equation Editor component of Microsoft Office,

Cybercriminals are using novel approaches to poison Google search results in the hope of infecting users with a banking Trojan

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary,

Launched in June last year, Google prompt was designed to improve the security of the login process by informing users

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical

A PIN password might seem like a secure way to lock a device but, considering how easy it is for

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails

Microsoft researchers detected a 300% increase in user accounts attacked over the past year, and 44% growth in the number

Google recently deleted around 300 apps from the official Play Store which were used to create what is being called

On Monday, Google released the long-awaited Android 8.0 Oreo. The newest version of the OS contains many new features and

COMPLIANCE

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal

 
 

FEATURED

Security researchers have discovered a custom-built piece of malware wreaking havoc in Asia for several months that could signal the

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could

S4x18 CONFERENCE – Miami – Industrial control systems giant Schneider Electric discovered a zero-day privilege-escalation vulnerability in its Triconex Tricon

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...