Tech Support Scammers Get Serious With Screen Lockers
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Tech support scammers are well aware of what is going on in the malware scene and often rip off ideas and concepts from other criminals. We see this today with for exampleRead More →
According to the global perspective of enterprise data security company; integrity, confidentiality, availability, auditability, and non-repudiation are the five fundamental pillars for any business data security solution. For small andRead More →
Crooks can steal money from ATMs using special credit cards. Skimer, a malware family targeting ATMs, has received a major update the past few months, and security researchers from Kaspersky areRead More →
There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, and India; two out of threeRead More →
GhostShell, the Romanian hacker who recently revealed his true identity in a very candid exposé, has returned to the world of hacking with a new leak as part of hisRead More →
Proofpoint researchers have recently observed the re-emergence of two malware downloaders that had largely disappeared for several months. Hancitor (also known as Tordal and Chanitor) and Ruckguv have reappeared inRead More →
Most of popular botnet Andromeda’s (also known as Gamarue) distribution channels have been discovered and analyzed by antivirus vendors. This has forced Andromeda’s distributors to come up with a new attackRead More →
Allwinner’s ARM Linux kernel includes “rootmydevice” code that gives apps root. Allwinner, a Chinese system-on-a-chip company that makes the processor used in many low-cost Android tablets, set-top boxes, ARM-based PCs,Read More →
Is the North Korea behind the hack of a South Korean defense contractor? The officials announced an investigation into the security incident. There is a constant tension between South KoreaRead More →
The information security plan describes how the security is implemented, defined policies, controls and solutions. The information security plan is developed considering all the IT resources depending on the securityRead More →