Archive

Adobe Flash Player is probably one of the applications that not many people know that they are using every day. This application is allowing you to view multimedia, execute rich Internet applications and stream video and audio. However, it seems

Thanks to different programming languages, we can do a lot of really great things with technology that people in the past would have considered impossible. Imagine someone from the late-1800s looking at an iPhone. While the most transformative applications for

The duo of Anonymous Italy and LulzSec Italy have hacked numerous job seeking portals and leaked some of their information online. The hackers announced the leak Saturday, April 9, as part of a new operation called#NessunDorma, which translated from Italian

India is the fourth country that has most number of attacks by the Downadup malware family, a report by Finland-based online security and privacy company F-Secure, said. It added that besides India, this threat was most frequently detected in Finland,

Researchers from security firm CheckPoint presented at the Black Hat Asia 2016 conference a new exploit to attack iOS 9 devices that are enrolled in a business scale management system. The enterprise devices are vulnerable from using past methods that

It’s a good idea to check your browser extensions if you use Firefox. Nine of the 10 most popular extensions for Mozilla’s browser open computers to malware and security breaches, according to a research paper presented at the Black Hat conference

Ransomware, malware that locks you out of your own machine —  is on the rise, according to an alert issued by the United States Computer Emergency Readiness Team (US-CERT). The agency, which is part of the U.S. Department of Homeland Security,

Amazon on Tuesday (Wednesday early morning in some parts of the world) sent out password reset emails to some of its Amazon account holders. The company said it had found “a list of email addresses and passwords posted online.” While

The Bill Gates/bot family of malware continues to be used to facilitate distributed denial of service (DDoS) attacks, allowing bad actors to seize full control of infected systems, according to a threat advisory from Akamai’s Security Intelligence Research Team (SIRT),

Adobe is working on an emergency patch for its Flash Player after attackers are reportedly exploiting a critical flaw. The vulnerability, CVE-2016-1019, affects Flash Player version 21.0.0.197 on Windows, Mac, Linux and Chrome OS, according to an advisory published on Tuesday.

Microsoft’s Cloud App Security Service — the product based on its Adallom acquisition — is generally available as of April 6. Microsoft bought cloud-security vendor Adallom in September 2015 for an undisclosed amount. Adallom’s technology monitored the use of software-as-a-service

Google has banned the Better History Chrome extension from the Chrome Web Store after users complained that it started taking over their browsing sessions and redirected them to pages showing ads. Things started to go wrong when users were prompted

New trends have emerged in the underground world of computer hackers, including an increase in working hours for Russian cybercriminals (they’re now available to meet your hacking needs 24/7) and an uptick in hacker self-promotion, with many advertising themselves as

Turkey on Wednesday launched an investigation after a hacker or hackers posted a database online containing the personal information of nearly 50 million Turkish citizens — more than half of the country’s population — and a message taunting President Recep Tayyip

A cyber-attack by a Turkish hacker group has interrupted operations of a number of Armenian government websites, including defense, energy and agriculture ministries, as well as other state agencies, causing prolonged inoperability. Hacker group ‘Aslan Neferler Tim’ (closely translated as

The dating site Ashley Madison’s data breach in August has exposed personal information of some 39 million users of Ashley Madison, the notorious infidelity website for cheaters. Despite the infamous hack that exposed millions of cheaters online,A rolling count on