Android malware can extract and steal one-time passcode (OTP) generated through Google Authenticator application.
WhatsApp should adjust the way users share invitations to group chats on their platform.
DDoS is a new form of attack, but it is always rated as the leading threat on the internet
We have long judged the severity of a cyber security disaster through financial losses and forgetting of negative mental consequences.
Access and identity management will continue to have timely and correct transformations suitable to the practical situation.
Bad luck seems to have not been released yet for Microsoft and Windows 7.
Ransomware has been one of the top security threats for nearly three years.
Spamdexing (also known as SEO spam) is one of the most popular 'hacking' methods to increase search engine rankings.
If nCoV-infected patients still have a high chance of being cured, then the computer system infected with this new virus is almost unable to recover data.
Dawn Smeaton, director of web application security at Trend Micro, said today's web-based applications are the new targets for hackers.
This is a Cross-Site Scripting (XSS) vulnerability.
Distributed denial of service (DDoS) is a common method used by hackers to try to bring down a website.
The United Nations recently acknowledged the organization was the target of a massive cyberattack in the summer of 2019.
The acute coronary pneumonia outbreak due to the new strain of Corona virus - nCov-2019 (Wuhan flu) is one of the world's top news.
The US National Security Agency (NSA) has issued a new guide to help organizations and businesses improve the security of data stored on the cloud.
The popular tools and software used by Microsoft have become the target of hackers to deploy online attacks many times.
Recently, the Indian Power Business Association has come to an agreement that it will deploy a comprehensive firewall system, combined with many other security measures.
Continuing to be a security scandal involving one of the world's largest technology corporations.
Ako was first discovered when a victim posted information about an infection he encountered on the Bleeping Computer security forum.
The complexity and sophistication of cyberattacks are always in line with the development of the internet world.