We know that our computer or laptop’s webcam is quite vulnerable to hacking and usually hiding their webcam’s lens with a piece...
A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This...
Short Bytes: Researchers at the Ben Gurion University, Israel, have created a malware, called Speake(a)r, to exploit a feature on Realtek codec chips....
This article will focus on teaching analysts on analysing malicious JavaScript code within the HWP files and a walkthrough of how we...
Facebook Messenger has become a favorite target of cyber-criminals lately since the social network’s messenger service is continuously being targeted with malware...
A botnet of IoT (Internet of Things) devices created with the Linux/Moose malware is behind many bots that are plaguing social networks...
News investigations show office supply chain sold unneeded fixes for $180. Office Depot and its sister retailer OfficeMax have stopped using a...
The infamous Ask Toolbar is back in the news again. In the past, it received backlash from security firms for pushing third-party...
The hackers call hotels, then send email attachments that look like customer information Hotel and restaurant chains, beware. A notorious cybercriminal gang...
New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background. Recent variants of Android.Fakebank.B have...
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an...
Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily...
Less than six hours after Donald Trump became the presumptive president-elect of the United States, a Russian hacker gang perhaps best known...
In 2013, the FBI received permission to hack over 300 specific users of dark web email service TorMail. But now, after the...
The internet of things is totally broken. Amateur hackers have managed to build huge botnets of compromised devices, and many of these...
If you ask any malware analyst these days, they’ll tell you they come across countless of useless or unfinished malware variants on...
A number of computers at a five-star Geneva hotel that has hosted sensitive talks, including Iranian nuclear negotiations, were found to be...
National Health Service in the United Kingdom targeted by ransomware attack forcing the service to delay organ transplants. Cyber-criminals are hell bent on exploiting...
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases...
Security researchers warn that a bogus Flash Player app aimed at Android mobile devices has surfaced and is luring victims to download and install...
After Samba ransomware that encrypts victims’ hard drives and CryPy ransomware known for encrypting each file individually here comes Fantom, a ransomware...