Experts from Dr Web discovered a new Linux Trojan called Linux.BackDoor.Irc.16 that is written in the Rust programming language. It is a...
In a nutshell Backdoor.OSX.Mokes.a is the most recently discovered OS X variant of a cross-platform backdoor which is able to operate on...
The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors...
A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged...
Short Bytes: Two researchers reported that Microsoft accidently compromised the golden keys to its UEFI Secure boot feature. The golden keys allow...
The new Trojan can be used to steal information and passwords from compromised computers. Symantec recently noticed that an Italian malware author...
Despite being older than many of its users, Short Messaging Service (SMS) remains a very popular communications medium and is increasingly found...
Dell SonicWall equipment came with a hidden account. Security researchers have discovered six serious security issues that plague several Dell SonicWall products, one...
Patch Tuesday wasn’t just about browser bugs. Microsoft has quietly killed a vulnerability that can be exploited to unlock ARM-powered Windows RT tablets...
The java-based cross-platform Adwind RAT not only steals data but also turns the infected device into a botnet! Cyber criminals always develop malware...
The latest malware targets Mac users to steal their user credentials — Watch out and don’t fall for it! A new Mac...
Macs targeted with new Backdoor.MAC.Eleanor trojan.Security researchers from Bitdefender have discovered a new malware family that opens a backdoor via the Tor...
Company also doesn’t support encryption backdoors. Via a statement from Steve Grobman, Chief Technology Officer for Intel Security, Intel has denied claims made...
Short Bytes: A security researcher has outlined a dangerous loophole that affects the Intel CPUs that have Intel Management Engine and vPro...
Users of the TeamViewer remote-access service have beencomplaining in recent weeks about how their systems have been hacked into, unauthorized purchases made on...
Intel x86 CPUs Come with a Secret Backdoor That Nobody Can Touch or Disable. Hardware security expert Damien Zammit says that recent...
SECURITY FLAWS IN software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier. Now...
Crooks use your PC to hide their IP, funnel Web traffic. BackDoor.TeamViewer.49 is the name of a backdoor trojan discovered by Russian security...
Allwinner’s ARM Linux kernel includes “rootmydevice” code that gives apps root. Allwinner, a Chinese system-on-a-chip company that makes the processor used in...
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote...
Security experts are warning PC users of scareware computer utilities published by the French firm Tuto4PC that secretly bundle adware and spyware....