
Popular online video conferencing applications like Zoom, Teams and Google Classroom are increasingly being fake by malicious agents to create fake domain names.

Intel has officially announced its 10th-generation mobile Core processor 'Comet Lake H-Series' for laptops, with the goal of pushing the maximum clock speed on laptops beyond the

OGUsers became the victim of a hack, despite the forum being run by the world's top hackers.

The new generation of 5G mobile networks is beginning to be deployed increasingly popular in countries around the world.

According to a new report released by Motherboard security experts, the iOS version of the Zoom app is quietly sending some analytical data to Facebook.

Apple released patches for a range of simple to serious vulnerabilities that have been confirmed on iOS and macOS platforms, Safari, watchOS, tvOS and iTunes.

Most ransomware is usually deployed three days after a hacker successfully enters an organization's network.

More than 60% of the managers surveyed said their organization was facing at least one security breach in 2019, mainly stemming from identity authentication.

Besides malware, spam emails or DDos attacks, vulnerabilities in open source software are also considered as one of the most significant security threats at the moment.

This botnet, called Necurs, is behind the notorious 'banking' trojan, GameOver Zeus, along with dozens of other types of malware.

Another relatively serious vulnerability on AMD processors has continued to be discovered, prompting the security community.

International security researchers have identified a critical flaw that exists in Intel CPUs.

Fake news is really becoming a worldwide problem. Deepfake is part of that mess.

Android malware can extract and steal one-time passcode (OTP) generated through Google Authenticator application.

WhatsApp should adjust the way users share invitations to group chats on their platform.

DDoS is a new form of attack, but it is always rated as the leading threat on the internet

We have long judged the severity of a cyber security disaster through financial losses and forgetting of negative mental consequences.

Access and identity management will continue to have timely and correct transformations suitable to the practical situation.

Bad luck seems to have not been released yet for Microsoft and Windows 7.

Ransomware has been one of the top security threats for nearly three years.