New Linux Trojan turns infected Linux Devices and websites into P2P botnets and threatens users with DDoS and ransom! — This Trojan...
These cases include ransomware infection and DDoS attacks! Enjoy Everyone has been talking about the growing threat of ransomware and non-stop distributed...
Republican and Democratic Networks’ Computer Systems were hacked — Attackers also hacked Donald Trump’s election campaign staff! The computer systems of Presidential candidate Donald...
Pokemon Go Game Inspiring one Scam After Another — After malware and RAT infected apps here comes Pokemon Go smishing (SMS Phishing) scam!...
Google AdSense targeted by Malware mimicking as Login Pages of Popular Websites and Apps Keystroke logging malware has become the most dangerous...
Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’...
Last month Wikileaks published emails stolen from Turkish ruling party AKP — Now, a researcher has presented a report showing the AKP...
Shadow Brokers hacking group is claiming that it hacked NSA’s Equation Group and stole a trove of hacking tools and exploits! Hackers are...
New technique makes malware detection almost impossible. A team of security researchers from Deep Instinct have discovered a method of injecting malware inside...
Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in...
A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant...
EFF exposes threat group operating for Kazakhstan regime. The Electronic Frontier Foundation (EFF) has released a report today named Operation Manul that details...
F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used...
Beware of fake Prisma photo editing app on Android store targeting users with phishing and malware scam! Prisma app for Android users was launched...
Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable...
Another day another PayPal scam — This time, it’s highly sophisticated and comes from a genuine PayPal email address! PayPal like other financial institutions...
There’s no such thing as a free ticket: How Illegal streaming is putting your security at risk It’s an expensive business being...
Another day another hack: Clash of Kings, one of the world’s most famous games on smartphones has its forum hacked, data stolen!...
The Internet is a great place to do business and cybercriminals are aware of that fact so how can you protect your networks,...
Increasingly, browsers are taking on a central role in our daily lives. With web apps for everything, we have placed our most...
Office exploit kits updates drop support for CVE-2012-0158. Two newer vulnerabilities targeting the Microsoft Office suite have become very popular in recent months,...