Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV...
Short Bytes: Jigsaw ransomware is a new threat affecting the computers and demanding ransom in a scary manner. If you fail to...
The Internet-connected cars will require firewall protection and some companies are already providing it The Internet has invaded most of the things...
Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. ...
Beware, even things on Amazon come with embedded malware… this is the disconcerting discovery made by the expert Mark Olsen. The security expert Mike...
An “evil” version of Skype is uploaded to an Apple iPhone. A whitehat hacker created a tool that automates the process of...
HACKING TEAM YET AGAIN IN HOT WATER, LOSES LICENSE TO SELL MALWARE OUTSIDE EUROPE Just a year after it was hacked, the...
Technology vendor Cisco is pushing out security updates to customers to address a critical vulnerability found in its recently introduced line of FirePower...
Alert: The previously discussed Steam Stealer malware is way bigger than we thought — The malwarE is also embedded with a remote...
The fix? No patch, just destroy all extensions. Black Hat Asia The most popular Firefox extensions with millions of active users are open...
Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs...
As more US companies snuff out point of sale malware by deploying chip-and-PIN bankcard technology, attackers are rushing to exploit existing magnetic...
Gumtree is a free classified advertising site and subsidiary of eBay particular popular in the UK, Australia, and South Africa. Gumtree is the number one local...
Short Bytes: Security researchers have identified a new malware named USB Thief that has the ability to steal data from air-gapped computers without leaving...
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the...
While you might think that what a Russian APT group does to attack Ukrainian infrastructure has little to do with the life...
Steam Stealer Malware is becoming a sensation for cyber criminals and it puts 125 million Steam users at risk According to the...
Do you consider non-jailbroken iPhones to be safe? Think again! AceDeceiver is playing havoc with Apple’s most celebrated devices. This malware has...
A not so new bug called Stagefright, that affects Android devices has been discovered by security researchers. The bug leaves millions of...
Legitimate code-signing certificates provide secret cover for attack groups. There are lots of ways to ensure the success of an advanced hacking operation....
Mainstream Websites including AOL, BBC and The New York Times Become Targets of Malvertising A number of popular, high-profile websites have become...