Today, WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of WiFi-capable Windows devices based on...
Malware authors are using an NSA hacking tool to infect Windows computers with a new cryptocurrency miner. Detected under the generic name...
As technology progresses, it seems that hackers and hacking methods do too. It wasn’t that long ago when hackers had to steal...
A unique and perhaps a very practical way of injecting malware into an entire network has been discovered in which the hacking...
A Malware called “EternalBlue” Vulnerability Successfully port the exploit to Microsoft Windows 10 by the Security Researchers which has been only affected...
Since the spread of WannaCry ransomware attack the cyber security community is doing whatever it takes to identify new threats against unsuspecting users....
In its latest release as part of the Vault 7 series, WikiLeaks has apparently leaked a document which consists information regarding a...
On Friday, Wikileaks published a CIA malware project known as Athena. According to the leaked documents, the Athena malware is capable of hijacking all...
Snake, also known as Turla and Uroburos, is backdoor malware that has been around and infecting Windows systems since at least 2008....
Short Bytes: The users of Webroot antivirus witnessed a strange problem recently when the software started flagging Windows system files as malware....
You may remember Google’s Safe Browsing Site Status mistakenly marking Google.com as a potentially dangerous domain to visit or the Google Maps mistakenly labeling...
Windows’ system files were flagged as malicious, and Facebook was marked as a phishing site. A malware signature update issued by the...
A group of hackers is performing highly sophisticated cyber-attacks against high-profile organizations of Middle East – Cyber security firms Palo Alto Networks...
After last month security researchers discovered the first-ever Word document spreading macro malware on macOS, last week, researchers from Fortinet spotted a...
Mirai malware was discovered in 2016 when it was used the Internet’s largest DDoS attack on DYN DNS and OVH hostings. A...
Malware distributed via affiliate programs and bundled with other applications is using a devious tactic to fool users into installing it on...
Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen...
Short Bytes: A cross-platform malware family has been reported by a security researcher from Kaspersky Lab. The malware can create a backdoor...
DNS Unlocker finds a way to hide hijacked DNS servers from human operators via one “special” character. A Potentially Unwanted Application (PUA) named...
Researchers have identified a new malware taking advantage of Windows God Mode and infecting users. Malware in a Window OS is not...
Short Bytes: Here are the simple and easy steps on how to find, kill and delete a remote connecting malware using command prompt...