DNSChanger causes network computers to visit fraudulent domains. As you read these words, malicious ads on legitimate websites are targeting visitors with...
Zcash, a cryptocurrency that debuted on 28th October 2016, is believed to be more anonymous than the overhyped Bitcoin. This new virtual currency...
Security researchers at Dr.Web, a Russia-based antivirus developer firm, have identified various cheap Android brands are being shipped with a malware in their firmware...
Google Chrome is one of the most used Internet browsers but lately, it is being used by cybercriminals and scammers to infect...
We know that through ransomware, cyber criminals get an excellent opportunity to make some easy money by encrypting data on the victim’s...
Symantec warns of growing number of malicious scripts. Microsoft PowerShell is a really powerful tool for IT professionals running Windows, and the...
Malware coders are advertising a new Android trojan that can be used for phishing banking credentials, intercepting SMS messages, locking devices with...
Over the last few months, we’ve seen a proliferation of these tech-support scams where users end up “locked” in their browsers with...
Crooks are spreading Android malware disguised as a one-time password (OTP) generator app for banking apps that steals the user’s banking credentials...
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming...
Carleton University (Canada, Ottawa, Ontario) students must keep their computers and Wi-Fi routers off because some of the computers at the university...
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various...
On Friday 25th, the San Francisco Municipal Railway (MUNI) had their computer systems hacked and locked by a hacker who ended up...
On Friday 25th, a report emerged that the San Francisco Municipal Railway (MUNI) couldn’t operate because its fare system, which is entirely...
We know that our computer or laptop’s webcam is quite vulnerable to hacking and usually hiding their webcam’s lens with a piece...
A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This...
Short Bytes: Researchers at the Ben Gurion University, Israel, have created a malware, called Speake(a)r, to exploit a feature on Realtek codec chips....
This article will focus on teaching analysts on analysing malicious JavaScript code within the HWP files and a walkthrough of how we...
Facebook Messenger has become a favorite target of cyber-criminals lately since the social network’s messenger service is continuously being targeted with malware...
A botnet of IoT (Internet of Things) devices created with the Linux/Moose malware is behind many bots that are plaguing social networks...
News investigations show office supply chain sold unneeded fixes for $180. Office Depot and its sister retailer OfficeMax have stopped using a...