The US-CERT issued a joint technical alert from DHS and the FBI, warning that two new identified malware has been used by...
HIDDEN COBRA is one of the well known hacking group who is behind the North Korean government spreading Powerful Joanap Backdoor and Brambul...
An Ubuntu user identified a malicious code that mines Bytecoin (BCN) hidden in the source code of the Ubuntu snap package (2048buntu...
According to researchers, the node’s Packet Manager (npm) team just avoided a disaster when it discovered and blocked the distribution of a...
A new Monero Mining Android malware dubbed ANDROIDOS_HIDDENMINER that uses the device CPU power to mine Monero malware and could cause the...
Another day, another Android malware – This time, the malware not only comes with Monero mining capabilities but its continuous mining process...
Messages sent to your iPhone may not be as private as you think.
The researchers at Kaspersky Labs have uncovered a malware, dubbed Slingshot, that has been able to hide for around six years. While...
Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted Bankshot malware...
Although I have a special place in my heart for this mobile operating system, I won’t say I am aware of every hidden...
Google Chrome comes as a default browser installed on most Android phones. It is fast, responsive and comes with all the basic...
It is very usual these days to find many applications having a hidden crypto-mining module. But the recent trend is more mainstream...
Even the creator of MINIX operating system didn’t know that his for-education operating system is on almost every Intel-powered computer. He is okay...
SMS Privacy is available as a Tor hidden service, and it turns out ~10% of users actually use it that way. This post...
On September 17, 2017, iOS 11 mobile operating system was released by Apple. The biggest features of iOS 11 included ARKit, improved camera,...
Europe’s leading cyber-security firm Positive Technologies’ security researchers have a bad news for Intel users. They have detected a secret configuration setting...
The biggest tech companies have their rigorous recruitment process to assess the candidates and find if they are suitable for their companies....
Short Bytes: The name VLC needs no introduction. Although most people perceive it only as a simple media player but hidden beneath...
Short Bytes: If you love clicking pictures and sharing them with your friends and family, by using some handy Instagram tricks you...
Short Bytes: Apart from your main News Feed, Facebook offers an option to access a second and hidden feed in its Android...
Creating a website is pretty simple. Creating a hidden service via Tor isn’t much different. In fact, if you have any semblance...