When using an app developed by a big company, you might think that it is trustworthy and ensures your security…
Before we continue, you might be wondering how could there be 'legitimate' hackers. Well, companies such as the one that…
You are probably wondering why we hear that legacy flaws are still present in new software. Well, the answer is…
Apple's iOS is widely recognised as one of the most secure mobile operating systems on the market today but is…
Hacking is something we see on a regular basis, but news about such events start cropping up more and more…
Lizard Squad was once an unknown name among a lot of people, however, this changed when both the Playstation Online…
Premature release of new material, or material never intended for release, is considered some of the most damaging by artists…
The recent White House power outage has turned into being something more than that. CNN reports that US officials have…
IBM's Security division has been researching a malware attack they have named 'The Dyre Wolf' which is said to have…
China has finally admitted that it has cyber warfare units after its government previously denied having any organised cyber warfare…
The easiest way for a hacker to gain access to another person’s online account is to crack a weak passwords,…
Sony Pictures Entertainment is still trying to recover from a major data breach that saw several movies leaked online, personal…
A hacker, charged with 44 felony counts of computer fraud and cyberstalking in the US, has avoided a whopping 440…
As part of an international operation targeting cybercriminals using remote access tools (RATs) to hijack computers, five people were arrested…
It is said that researchers over at Dell's SecureWorks security division have uncovered a series of hacking attempts in which…