‘Moonlight’ group is likely to be involved in cyberespionage, warns Vectra Networks. A hacking group is conducting cyberespionage against targets in the...
Beware of not so old yet widespread Microsoft Security Essentials Scam that tells users to call a support number that instructs users to...
Short Bytes: Check Point has released the list of the most dangerous malware that are most prevalent in the world. This list was topped by...
Trojan targets desktops, not servers or IoT devices. Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with...
The click me game malware is developed by Iranian hacker as its readme file is written in Persian. Karsten Hahn, a malware...
Yesterday, GData malware analyst Karsten Hahn discovered an in-development ransomware disguised as a click me game. When executed the ransomware will launch a screen that...
“Common sense” is an oft-prescribed remedy for email-based malware threats: Don’t click on unknown links, don’t enable macros in documents from unknown...
“Side channel” in Haswell CPUs lets researchers bypass protection known as ASLR. Researchers have devised a technique that bypasses a key security protection...
Malware hides credit card data inside image files. Hackers are collecting payment card data from Magento stores, hiding the stolen data inside...
NRSC hack – A platform used by the National Republican Senatorial Committee for the donations was hacked and donors’ financial data have...
Who needs complicated malware when you have dynamite.Criminals like to use explosives to break into ATMs, rather than deploy malware, a recent...
Your Selfie can Land You In Great Trouble — Researchers Discover New Malware that Asks for User’s Selfie to Carry Out Identity...
Forget ATM malware, criminals are using explosive to crack ATM machines and steal thousands of Euros in Europian countries. It is definitely...
Android Smartphones from Foxconn Manufacturer Plagued with Dangerous Security Flaw known as Pork Explosion. Android operating system has become quite vulnerable to...
Sierra Wireless confirms that devices it manufactures were infected by Mirai. This week, the US government-backed ICS-CERT warned that the troubling new generation...
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to...
New Ransomware CryPy Can Encrypt Each File Individually with a Special Key — The C&C of this ransomware is hosted on a hacked...
Researchers for the new ‘Hacker’s Playbook’ analyzed 4 million breach methods from an attacker’s point of view to gauge the real risks...
Be careful when you download WinRar or TrueCrypt installer – Researchers have found several websites distributing malware infected files for both installers. A...
You may know Cerberus often called the “hound of Hades”, a monstrous multi-headed dog but in this case, Cerber is one nasty...
If you are a Mac user you need to be extra careful – Other than covering your webcam there is a tool...