Attackers have made off with up to US$400,000 (£290,000) in cryptocurrency after an ingenious attack on Stellar Lumen (XLM) wallet,

The company trying to be the Google of hacked user credentials says it just obtained another huge leak, this time

Researchers have found a loophole in Intel processors that allow an attacker to bypass logins and place backdoors on laptops,

The malware, dubbed OSX/MaMi by Wardle based on a core class named “SBMaMiSettings,” is currently only detected – at least

OPCDE : short for operational code, it is a number that determines the computer instruction to be executed. The most

Join Fran Malloy, IBM Security Technical Sales Management and former CISO of a Fortune 500 company, as he shares an

Technology adoption is bringing about massive change in major cities around the world from smart traffic lights to knowing exactly

Ransomware & malware multiply Ransomware has been a cash cow for criminals, as well as a disguise for more destructive

Attackers continue to exploit a recently patched remote code execution vulnerability in the Microsoft Equation Editor component of Microsoft Office,

Cybercriminals are using novel approaches to poison Google search results in the hope of infecting users with a banking Trojan

Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary,

Launched in June last year, Google prompt was designed to improve the security of the login process by informing users

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical

A PIN password might seem like a secure way to lock a device but, considering how easy it is for

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails

Microsoft researchers detected a 300% increase in user accounts attacked over the past year, and 44% growth in the number

Google recently deleted around 300 apps from the official Play Store which were used to create what is being called

On Monday, Google released the long-awaited Android 8.0 Oreo. The newest version of the OS contains many new features and

Ethereum and ICOs – the hackers keep getting rich. On Sunday, hackers stole nearly $500,000 in Ethereum from Enigma, a

A security flaw that could affect millions of cars has been identified, with researchers warning that there may be no

According to recent Proofpoint research, eight extensions for the Google Chrome web browser have been compromised by attackers, sending malicious

A new modification of notorious mobile banking Trojan “Faketoken” has resurfaced which is able to steal credentials from popular taxi

Researchers have discovered that cyber attackers are exploiting a vulnerability that allows them to elude antivirus software to deliver malware

Two critical zero-day vulnerabilities have been detected in the Foxit Reader software that could allow attackers to execute arbitrary code

Malware has threatened computers, networks, and infrastructures since the eighties. There are two major technologies to defend against this, but

In 2016, Linux turned 25. When it began, it was a student project. Today, Linux runs everything. From smartphones to

A variant of an old adware for Mac was recently discovered, and has sneakily found a way to circumnavigate security

A powerful form of ransomware, which encrypts whole hard drives instead of just files, has suddenly returned — and there’s

WikiLeaks has published another Vault 7 leak where the CIA spy on video streams remotely. The document released by WikiLeaks

Microsoft has released 48 security patches for all supported versions of Windows systems and other products today. The patches will

COMPLIANCE

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal

 
 

FEATURED

Launched in June last year, Google prompt was designed to improve the security of the login process by informing users

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...