HACKING TEAM YET AGAIN IN HOT WATER, LOSES LICENSE TO SELL MALWARE OUTSIDE EUROPE Just a year after it was hacked, the...
Technology vendor Cisco is pushing out security updates to customers to address a critical vulnerability found in its recently introduced line of FirePower...
The FBI issued a confidential urgent “Flash” message to the businesses and organizations about the Samsam Ransomware, why it is so dangerous?...
Alert: The previously discussed Steam Stealer malware is way bigger than we thought — The malwarE is also embedded with a remote...
The fix? No patch, just destroy all extensions. Black Hat Asia The most popular Firefox extensions with millions of active users are open...
We have been alerted to a recent Steam scam, thanks to one gamer who is quick to inform her friends in the...
Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs...
Scammers Distribute Malware to Drivers in Pennsylvania using Accurate Speeding Data Scammers and their antics are simply unbelievable. This time, scammers have...
As more US companies snuff out point of sale malware by deploying chip-and-PIN bankcard technology, attackers are rushing to exploit existing magnetic...
Gumtree is a free classified advertising site and subsidiary of eBay particular popular in the UK, Australia, and South Africa. Gumtree is the number one local...
ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection...
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the...
While you might think that what a Russian APT group does to attack Ukrainian infrastructure has little to do with the life...
Steam Stealer Malware is becoming a sensation for cyber criminals and it puts 125 million Steam users at risk According to the...
DDoS attacks can have an amplification factor of 26.5. An independent security researcher that goes by the name of MalwareTech has discovered a...
Do you consider non-jailbroken iPhones to be safe? Think again! AceDeceiver is playing havoc with Apple’s most celebrated devices. This malware has...
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation....
Introduction The concept of file-less malware is not a new one. Families like Poweliks, which abuse Microsoft’s PowerShell, have emerged in recent...
Researchers analyze five AV-made system repair tools.System rescue tools provided by antivirus makers are often used to clean infected systems after the...
ESET security researchers have discovered an Android malware targeting banking customers in Australia — The malware also bypasses the two-factor authentication system Four...
Kaspersky Lab recently spotted a new Android malware dubbed Triads Trojan, which they say is the most advanced mobile malware seen to...