F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used...
Beware of fake Prisma photo editing app on Android store targeting users with phishing and malware scam! Prisma app for Android users was launched...
Audacity and Classic Shell software downloads affected. A hacking crew that goes by the name of PeggleCrew has compromised Fosshub and embedded malware...
Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable...
X-Tunnel is roughly based on XTunnel PortMap. One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC)...
Another day another PayPal scam — This time, it’s highly sophisticated and comes from a genuine PayPal email address! PayPal like other financial institutions...
A new website set up by Europol, Intel and Kaspersky to help resist the threat of ransomware could allow you to recover...
Increasingly, browsers are taking on a central role in our daily lives. With web apps for everything, we have placed our most...
It may be a good idea to stay away from this software. The website of the Ammyy Admin remote desktop management utility has...
It’s not the next Stuxnet, says SentinelOne, it’s just very naughty code. Malware hyped as aimed at the hear of power plants...
The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark...
The US Federal Deposit Insurance Corporation (FDIC) was hacked between 2010 to 2013 and the usual suspect is China! The House Committee on...
ATM transactions suspended in Taiwan for two days. Taiwan’s top eight banks have suspended operations on 900 ATMs after crooks stole NT$70 million...
Short Bytes: In order to catch child pornography watchers, FBI created a website Playpen and hosted it on the dark web. Later...
Tool only drops malware after painstakingly dismantling AV and other defenses. A campaign that targeted a European energy company wielded malware that’s so...
Tagged as “Ranscam”, Powershell and script-based malware is a botched smash-and-grab. There has been a lot of ingenuity poured into creating crypto-ransomware, the...
Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or...
Short Bytes: Nintendo’s insanely popular augmented reality mobile game Pokemon Go is a massive security risk. Surprisingly, this app has complete access...
We should always think twice before running an unknown program downloaded from the Internet. Of course not every application is dangerous, but...
The latest malware targets Mac users to steal their user credentials — Watch out and don’t fall for it! A new Mac...
ESET analyzes multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject advertisements into browser displays while...