By the first quarter of 2015, hacker/cyber-attackers have optimized their efforts to design Android Malware to such an extent that every seventeen...
Links traced to “Animal Farm” group and State Sponsored cyber criminals who already have targeted Syrian and Iranian computers in 2013. Bratislava,...
“The Internet is full of pioneers and cowboys. It’s also got its fair share of pirates and trolls.” Piracy is the biggest...
The problem with Facebook is thousands of active phishing scams but the social media giant has partnered with popular security software developer firm...
‘Stolen Foxconn certs’ used for embedding Duqu 2.0 malware into Windows PC — The crafty super-sophisticated malware infiltrated Kaspersky Labs. Reportedly, Duqu...
In April 2015, we reported how Ask.com toolbar is working as a malware to hijack your computer. Now proving our claim right, previous...
The vintage Ask toolbar that you can spot in your computer’s web browser has now been termed as threat to your PC...
Tox is yet another example of cyber justice that has been meted out by cyber criminals. In this case, Tox sends a...
Software developers will have the opportunity to integrate their application to any antimalrware program (available on their computer) in windows 10. Microsoft...
Hackers spammed Facebook timelines and newsfeeds with malicious malware that spread pornographic videos and images. The attack left hundreds of social media...
Some versions of Vawtrak banking Malware or Neverquest have been discovered to be having hidden command and control servers at Tor anonymity...
Canada approves anti-terror law C-51 that weakens Internet privacy – NDP-Liberal coalition may get triggered as a result warn conservative critics. At...
Trend Micro researchers have identified a new scheme in which scammers have used Facebook again to distribute malware. This malware has been...
Please note that the email that appears to be sent by USPS informing that due to incorrect address the firm has failed...
A UK man has been charged this week with a non-custodial sentence, after a ransomware infection on his computer made him confess...
The email apparently is sent from the popular messaging service WhatsApp and claims that you have received an audio recording. A malicious...
To demonstrate their creativity cybercriminals have released a new ransomware equipped with file encryption abilities and this time they have chosen logo...
Summary: In a bid to raise awareness regarding the way malware can affect GPUs, a team of developers recently created a Linux...
The malicious email, targeted at a company’s resume screening department, is equipped with file encryption capabilities. A new ransomware having capabilities of...
The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals...
Google’s recent study shows the effect of the Ad Injection in our digital media. We already know and hate the ad frauds,...