WinRAR, the popular file compression and decompression utility, has a security vulnerability that allows attackers to remotely execute code on the user’s...
Kovter Trojan can hide in Windows registry and does not need to be stored on the computer’s hard drive- claims Symantec —...
The Dyreza Trojan long ago ceased its exclusive focus on stealing banking credentials, and has been blamed for its part in attacks...
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you...
Short Bytes: Do you know about the Darknet and TOR? Here’s an interesting piece of information if you are interested in the...
Short Bytes: In the second article of Getting Started With Raspberry Pi series on fossBytes, I’ll be telling you about all the...
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released...
Short Bytes: Finally, Microsoft takes some time to address the widespread Windows 10 privacy concerns. In a blog post on Windows.com, a...
VBA stands for Visual Basic for Applications and is a programming language developed by Microsoft to help programmers create Windows applications using...
Short Bytes: iOS 9 has a new feature Wi-Fi Assist that sucks your cellular data if the W-Fi coverage in your area...
Short Bytes: The Pirate Bay co-founder Gottfrid Svartholm Warg is truly free again. Kristina Svartholm, his mother, announced the release on Twitter this Monday. The...
A malicious advertising campaign has targeted top adult sites like Pornhub and YouPorn. Several of the world’s most popular pornographic websites were...
Technique allows full recovery of 2048-bit RSA key stored in Amazon’s EC2 service. Piercing a key selling point of commercial cloud computing...
A trojan strand targeting Android devices has been found coming pre-installed inside the firmware of some Android smartphones by Dr.Web, a Russian-based...
Researchers have found that smartphone browsers can deliver a powerful flooding attack. Researchers suspect a mobile advertising network has been used to...
A new ransomware email campaign detected in the fake email messages sent by either PostNord or Post Denmark, identified as Cryptolocker2. Hackers...
The Microsoft Enhanced Mitigation Experience Toolkit, short EMET, is an optional download for all supported client and server versions of Microsoft’s Windows...
Yesterday’s update of the encryption software VeraCyrpt fixed two vulnerabilities that security researcher James Forshaw discovered in TrueCrypt’s source code. TrueCrypt, which...
Tool to check malware in Twitter URLs to be tested during European Football Championships next summer. An intelligent system has been created...
Yesterday at the Maker Faire in New York, we had a chance to check out the Rephone, a clever little project that...
Some of the good things in store for those attending Virus Bulletin 2015.