In an attempt to benefit from the recent spike in the value of Bitcoin, the authors of a remote access Trojan have started targeting...
Hi, what are you looking for?
In an attempt to benefit from the recent spike in the value of Bitcoin, the authors of a remote access Trojan have started targeting...
Microsoft this week released an update for the Microsoft Malware Protection Engine (MPE) to address a critical severity remote code execution (RCE) vulnerability in...
Thousands of WordPress sites have been infected with a piece of malware that can log user input, Sucuri warns.
Chrome's Site Isolation Feature Renders Each Web Site in a Separate ProcessGoogle is boosting the security of its browser with the release of Chrome...
Apple this week released security updates for macOS, watchOS, and tvOS, as well as updated versions of the Safari browser and the iTunes for...
A new ransomware family is using the SambaCry vulnerability that was patched in May to infect network-attached storage (NAS) devices, researchers have discovered.
Java/Android developers are exposed to vulnerabilities affecting the development tools, both downloadable and cloud based, used in the Android application ecosystem, Check Point warns.
The December 2017 Android security patches that Google released this week resolve 47 vulnerabilities, including 10 rated Critical severity.The patches affect a variety of...
LeakBase, an online service that provided paid access to leaked credentials, was shut down over the weekend.
The Federal Bureau of Investigation (FBI) and law enforcement agencies in Europe managed to dismantle the Andromeda botnet last week.
Google is stepping its fight against unwanted and harmful applications on Android up and will soon alert users on apps and websites leading to apps that...
Two newly discovered .NET-based ransomware families are using open source repositories to encrypt users’ files, Zscaler security researchers say.