The state of Mac malware
Mac users are often told that they don’t need antivirus software, because there are no Mac viruses. However, this is not true at all, as Macs actually are affected byRead More →
Malware News | Infosec Blog | Information Security Tutorials
Mac users are often told that they don’t need antivirus software, because there are no Mac viruses. However, this is not true at all, as Macs actually are affected byRead More →
Researchers find 150 Ramnit-infected apps a year after a similar batch was discovered. Last year, researchers discovered 132 Android apps in the Google Play market that lamely attempted to infect users with… WindowsRead More →
RMH Franchise Holdings revealed on Friday afternoon that PoS (point of sale) systems at the Applebee’s restaurants were infected with a PoS malware. According to information security training specialists, the PoS malwareRead More →
Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware – and how to avoid falling victim to attacks. WhatRead More →
Normally, each malware has a specific purpose according to the hacker that programs it. Recently, the mining software that uses victims’ hardware to mining cryptocurrencies is trend, although we alsoRead More →
Ransomware is one of the most important threats facing Internet users. Its rate alerts much to both companies and users. Hackers take advantage of the most popular sectors and whereRead More →
SamSam ransomware in January infected vulnerable networks in hospitals, city councils, educational facilities and transportation systems. Now SamSam ransomware is back and the Colorado Department of Transportation is its mostRead More →
DNS requests are one of the elements that most often spy on third-party applications and services. Every time we visit a website, before connecting directly to it, a request isRead More →
Certificates registered in names of real corporations are surprisingly easy to come by. The Stuxnet worm that targeted Iran’s nuclear program almost a decade ago was a watershed piece ofRead More →
As we all know, the techniques used by hackers to carry out their activities are very varied; now they look for flaws in the configuration of services and common applications,Read More →