A newly discovered piece of ransomware appears mainly created to destroy the victim’s files instead of encrypting and holding them for ransom.
Hi, what are you looking for?
A newly discovered piece of ransomware appears mainly created to destroy the victim’s files instead of encrypting and holding them for ransom.
A critical and widespread arbitrary file overwrite vulnerability has been addressed in popular libraries of projects from HP, Amazon, Apache, Pivotal, and more.
A recently discovered remote access Trojan is using a specialized program library that allows operators to interact with the infected machines directly, without an...
Internet of Things (IoT) botnets prey on the use of default or weak credentials to compromise connected devices, but the operators of such a...
At its Worldwide Developers Conference (WWDC) 2018 this week, Apple shared information on the security improvements that iOS 12 and macOS Mojave are set...
Apple has released a set of updates to address dozens of vulnerabilities in products including macOS, iOS, Safari, tvOS, watchOS, and iTunes and iCloud...
A recently discovered backdoor built by the Iron cybercrime group is based on the leaked source code of Remote Control System (RCS),
Google has made the firmware of Pixel 2 devices resistant to unauthorized attempts to upgrade it by password protecting it.
Phishing attacks carried out via text messages that use the “Punycode” technique to make nefarious URLs look legitimate are becoming more popular, cloud security...
Encrypted email service provider ProtonMail on Wednesday announced the availability of a virtual private network (VPN) service for macOS users.
Earlier this year, a security researcher discovered that it was possible to bypass Google’s reCAPTCHA via HTTP parameter pollution.
Google this week released Chrome 67 to the stable channel to provide various improvements, including patches for 34 vulnerabilities.