A newly observed Linux backdoor Trojan can perform its nefarious activities without root access, by using the privileges of the current user, Doctor Web...
Hi, what are you looking for?
A newly observed Linux backdoor Trojan can perform its nefarious activities without root access, by using the privileges of the current user, Doctor Web...
The Sarvdap spambot was recently observed checking the IP addresses of infected hosts against common blacklists, in an attempt to ensure that its spam...
Microsoft’s popular text, audio and video messaging service Skype can be used to record keystrokes and reveal what a user has typed, researchers say.
Starting in Firefox 51, Mozilla’s web browser will display an error when a SHA-1 certificate is encountered that chains up to a root certificate...
Oracle this week released its Critical Patch Update (CPU) for October 2016 to deliver a total of 253 new security fixes across multiple product...
A recently conducted security assessment of VeraCrypt has revealed over 25 security vulnerabilities in the popular encryption platform, including a critical cryptography flaw.
While Google has been releasing monthly Android patches for over a year, the overall impact on device security has been much lower than expected, and...
Unknown sources account for hundreds of thousands of Trojan installations on Android devices, but Google Play and pre-installation are also main sources of malware...
A recent study conducted by Dimensional Research has revealed that most organizations don’t have a security strategy in place to protect the growing number...
Internet of Things (IoT) devices with hardcoded default login credentials are being targeted by a newly discovered Linux malware, security researchers warn.
Researchers from Cisco Talos have created a new tool that allows users to extract the configuration of the Locky ransomware.
A newly observed ransomware family that was written in Python fetches a unique key for each of the victim’s files before encryption, Kaspersky researchers...