High-severity bugs in 25 Symantec/Norton products imperil millions
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
Lizard Squad’s tool becomes very popular thanks to the millions of unsecured IoT devices ready for the taking. Security experts from Arbor Networks have uncovered over 100 botnets that areRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
Last week Apple cleared the air as to whether or not it intentionally released an unencrypted version of its iOS 10 beta kernel to the developer community, stating the moveRead More →
Hackers have stolen $10 million from an unnamed Ukrainian bank, according to an independent IT monitoring organization. The Kyiv branch of ISACA, the Information Systems Audit and Control Association, reportedRead More →
As data-encrypting malware proliferates, new entrants search for ways to stand out. The crypto ransomware racket is a booming business thatgenerates lots of revenue, so it only makes sense thatRead More →
F YOU RECEIVE A FACEBOOK NOTIFICATION REGARDING A FRIEND TAGGING YOU IN A COMMENT BE VERY CAREFUL BEFORE CLICKING ON THE LINK IT CAN BE A JAVASCRIPT MALWARE FOUND TARGETINGRead More →
We recently noticed Retefe campaigns targeting UK banking customers. Using fake certificates, the Trojan is designed to trick victims into giving up their login credentials and other sensitive information. AtRead More →
Rooting malware is getting more popular with every new week. Security experts from Lookout have identified an app in Google Play Store that hides malware capable of rooting the user’s deviceRead More →
In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one ofRead More →