Short Bytes: A team of Italian security researchers has created a Windows filesystem add-on named ShieldFS to fight the ransomware attacks. By...
In the recent DEF CON Meet, technical director of security shop Endgame Hyrum Anderson disclosed a research paper on adapting API frameworks...
Android devices are one of the most vulnerable mobile OS (operating systems) due to its open source nature. But what would a...
This without a doubt is the second largest health data breach caused by a ransomware attack. An Oaks, Philadelphia based women’s healthcare...
It’s no surprise that the Internet of Things (IoT) devices are highly vulnerable to cyber attacks but who would know a time...
A JA3 hash represents the fingerprint of an SSL/TLS client application as detected via a network sensor or device, such as Bro...
Law enforcement authorities in China have arrested eleven hackers suspected of developing Fireball malware which infected 250 million computers worldwide. Among the...
With every passing day, hackers and cyber criminals are becoming more sophisticated in their attacks. Resultantly, they are getting their hands on...
Kaspersky Lab has identified the presence of a backdoor designed primarily for attacking Windows systems. When the backdoor successfully infects the system...
ATMs (automated teller machines) have remained a preferred target of hackers around the world. Last year, ATMs in over a dozen locations...
Short Bytes: Two malware which go by the name FruitFly and FruitFly 2 have been discovered over the course of the last...
Surveillance malware dubbed Firefly was easy to spot but flew under the radar anyway. A mysterious piece of malware that gives attackers...
In January this year, a dangerous surveillance malware was found targeting Mac and Linux devices – The malware was discovered by Thomas...
Android is among the widely used mobile operating systems around the world. Understandably it is the top priority for Google to keep...
Short Bytes: The security researchers have found a malware that uses stealthy techniques to perform monetization by injecting ads. Called Stantinko, this malware...
WikiLeaks has released a trove of data belong to the American intelligence agency CIA (Central Intelligence Agency) – The latest batch shows...
Google is rolling out their automatic app scanning service called Google Play Protect. What it basically does is it runs in the background...
Internet connected devices are the current rage among businesses and corporations alike. However, the various, far-reaching drawbacks associated with connecting every system...
Short Bytes: The researchers at the Trend Micro security firm have uncovered a new Android malware that exists in three different versions. Called...
FedEx, a US based globally operating delivery firm, states that customers associated with its subsidiary company TNT Express are continually facing issues....
It is not uncommon for scammers to send phishing emails that trick the users into downloading a malicious link or simply open...