NSA Couldn’t Hack San Bernardino iPhone, Official Says
When the FBI was trying to break into the San Bernardino shooter’s iPhone, many assumed that the NSA would have the technical capability to do so. Turns out, one ofRead More →
When the FBI was trying to break into the San Bernardino shooter’s iPhone, many assumed that the NSA would have the technical capability to do so. Turns out, one ofRead More →
How Chipzilla and Microsoft hope to get one step ahead of hackers. Intel is pushing a neat technique that could block malware infections on computers at the processor level. That’s theRead More →
The chief executive of tech support firm Zendesk has become the latest high-profile figure to have his Twitter account hacked. Mikkel Svane’s hijacked account had its ID image changed toRead More →
All Necurs activity stopped on June 1, down ever since. The Necurs botnet, the largest malware distribution botnet known today, seems to be facing some technical problems, and the direct consequenceRead More →
In related studies: Ice is cold; fire still hot. Internet file sharing has long been a prime route for malware to spread. The situation is one of the reasons (aside fromRead More →
US-CERT warns about a rise in macro malware. Following numerous reports from various security firms about a large number of malware that uses macro scripts in Office documents to spread, theRead More →
Intel Security has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious attachment or by usurping an Adobe Flash Player installation.Read More →
is the default PDF reader that is included in the Google Chrome web browser. Talos has identified an exploitable heap buffer overflow vulnerability in the Pdfium PDF reader. By simplyRead More →
While SNSLocker isn’t a stand-out crypto-ransomware in terms of routine or interface, its coarse and bland façade hid quite a surprise. After looking closer at its code, we discovered thatRead More →
Introduction Satellites have assumed a crucial role in our contemporary society; they are used in both private and public sectors for numerous purposes, from communication to research. Unfortunately, with theRead More →