High-risk vulnerabilities found in SinVR app leaked personally identifiable information of customers for around five days.
Swisscoin is an obscure cryptocurrency and its trading was briefly suspended after it was reported to be a ponzi scheme.
The Satori variant comes less than a month after hackers posted the working code for a Huawei router exploit, which was used by the original Satori botnet, for free.
The attack comes just days after the group hacked the accounts of India's top diplomat to the United Nations and World Economic Forum president.
The hacker claimed that the sale of the malware's source code made him "very rich", which experts suspect may be true.
A fresh bug affecting iOS and Apple Macs can let pranksters crash your Apple devices via a simple text message, a security expert has revealed.
Researchers spotted the extensions while investigating a recent suspicious spike in outbound network traffic from a customer's work station.
ARC-embedded processors are found in a wide range of internet-connected devices including cars, mobiles, TVs and cameras.
The photo is making waves on social media and has already drawn criticism, outrage and ridicule online.
North Korean hackers have increasingly targeted cryptocurrency firms and users to generate funds for a country squeezed by sanctions and trade restrictions.
The malware is believed to have been created by a nation-state and has reportedly been publicly available online for nearly a month.
A US hospital has paid hackers $55,000 (£39,900) to restore control of its computer systems after they were infected with a strain of ransomware known as "SamSam".
UK's spy nerve centre hopes old cypher will pique interest of young girls who have code-breaking knack and inspire them to join the service as adults.
Skygofree dubbed "one of the most powerful spyware tools" ever spotted exposed by cybersecurity researchers.
Researchers say hackers are constantly looking to exploit anxious users, particularly during widely publicised events such as the recently disclosed Meltdown and Spectre flaws.
The latest attacks come as hackers increasingly target cryptocurrency using various nefarious methods amid the growing popularity and value of virtual currency.
The website was abruptly shut down in January 2017 leading many to believe the service was raided by law enforcement.
The critical vulnerability in the popular Transmission BitTorrent app was exposed by Google Project Zero researchers.
A 24-year-old cybercriminal who ran an online "product-testing service" for criminal hackers called reFUD.me has pleaded guilty to computer misuse and money laundering.
Chinese smartphone manufacturer OnePlus has launched an investigation after a number of customers who used its website to purchase products complained of attempted fraud.
A US hospital has been forced to shut down its computer systems for days after criminal hackers infected its network with file-locking ransomware and demanded payment.
This isn't the first time hackers have targeted crypto-related businesses and exchanges in recent months.
"We will show you the power of the Turk!" the hackers tweeted from the compromised accounts.
"The only differences, at least at first glance, are the misspelling of Telegram," security researchers warned.
OSX MaMi is a DNS hijacker but also features a slew of other malicious capabilities, security researchers said.
The fake article appeared on the All Whites' official website claiming his resignation was effective immediately.
Malicious code that displays pornographic advertising on Android applications, including several intended for use by children, has been found lurking in 60 gaming apps.
The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionage campaign against the Senate.
A 26-year-old man has been charged in US federal court for playing a role in the so-called "Fappening" phishing scheme that terrorised celebrities with nude photo leaks.
A newly-disclosed Intel security flaw impacting most corporate laptops can let hackers with physical access to computers bypass passwords in "less than 30 seconds".