A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as ...
Regular readers of Hot for Security will have read plenty of articles about cybercriminals who have created malware, or ...
Notepad++, one of the most widely used text editors on Windows, has rolled out version 8.8.9 to patch a serious security flaw ...
React vulnerability CVE-2025-55182 exploited by crypto-drainers to execute remote code and steal funds from affected websites ...
September saw the release of One Battle After Another, a fast-paced drama starring Leonardo DiCaprio, which is already being touted as an Oscar favorite. However, with a running time of just under ...
With another year of technology news now behind us, it’s time to look back at Information Age ’s most popular stories of 2025 ...
As the festive season approaches, the excitement of gift-giving is in the air, but so is the lurking threat of cunning scams.
Amazon is also cracking down on the use of 'dodgy' Fire TV sticks by blocking apps that are identified as helping users gain illegal access to pirated content. An Amazon spokesperson said: “Piracy is ...
Cyber security in 2026 will be shaped by speed. Threat actors will move faster, using AI offensively to mimic human behaviour, and exploit systems in ways traditional defences cannot keep up with. At ...
Over the weekend, ​Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the ...
MITRE has released its Top 25 CWE list for 2025, compiled from software and hardware flaws behind almost 40,000 CVEs ...
Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default for 26 years ...