The infamous Ask Toolbar is back in the news again. In the past, it received backlash from security firms for pushing third-party...
The hackers call hotels, then send email attachments that look like customer information Hotel and restaurant chains, beware. A notorious cybercriminal gang...
New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background. Recent variants of Android.Fakebank.B have...
Researchers are working on a new CPU chip design that will extend the fight against malware at the hardware level in an...
Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily...
Less than six hours after Donald Trump became the presumptive president-elect of the United States, a Russian hacker gang perhaps best known...
In 2013, the FBI received permission to hack over 300 specific users of dark web email service TorMail. But now, after the...
The internet of things is totally broken. Amateur hackers have managed to build huge botnets of compromised devices, and many of these...
If you ask any malware analyst these days, they’ll tell you they come across countless of useless or unfinished malware variants on...
A number of computers at a five-star Geneva hotel that has hosted sensitive talks, including Iranian nuclear negotiations, were found to be...
National Health Service in the United Kingdom targeted by ransomware attack forcing the service to delay organ transplants. Cyber-criminals are hell bent on exploiting...
Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases...
Security researchers warn that a bogus Flash Player app aimed at Android mobile devices has surfaced and is luring victims to download and install...
After Samba ransomware that encrypts victims’ hard drives and CryPy ransomware known for encrypting each file individually here comes Fantom, a ransomware...
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators...
Verint’s Cyber Research team has discovered an unknown variant of the Nymaim malware family, a group of threats that are also capable...
Although Locky sounds like fun, it actually denotes one of the today’s prevalent ransomware families. Discovered in mid-February 2016, this file-encrypting epidemic...
Security researchers discovers IRCTelnet malware. A new malware family written by what appears to be an experienced coder is aiming for Linux-based...
IT security professionals appear to be in a constant run after numerous ransomware authors who systematically infect individual computers as well enterprise...
We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable...
Recently, our analyst Jérôme Segura captured an interesting payload in the wild. It turned out to be a new bot, that, at...