Banking Trojan Trickbot New Tricks
The TrickBot Trojan has been upgraded with new modules to make detection, and defense, more…
Internet-facing endpoints are exposing businesses worldwide to a botnet which is now being used in targeted ransomware campaigns: Phorpiex worm
An established botnet and worm malware variant is engaged in a new campaign designed to…
How safe is your data?: Two-pronged cyber attack infects victims with data-stealing trojan malware and ransomware
Hey, as you open up to the new year, as a computer user, advanced or…
What if your Brain was hacked?
[su_dropcap style="flat" size="5"]I[/su_dropcap]magine the horror of having your mind erased by a vicious hacker or…
The Most Advanced Industrial Malware Ever Seen
In August last year, a petrochemical company with a plant in Saudi Arabia was hit…
Facebook Discloses Hack Affecting 50 Million Accounts
[su_dropcap style="simple" size="5"]A[/su_dropcap]ttackers stole Facebook access tokens, which keep you logged in so you don't…
UEFI (Unified Extensible Firmware Interface)
(Unified Extensible Firmware Interface) A standard programming interface for booting a computer. Governed by the UEFI Forum (www.uefi.org),…
Russian malware can survive windows re-installation
Russian state-sponsored hackers appear to be using malware that can persist on Windows PCs even after the…
This is How US authorities tracked down the North Korean hacker behind WannaCry
US authorities put together four years worth of malware samples, domain names, email and social…
A Fresh Look at Malware and Mobile Threat Prevention
It goes without saying that in IT security, there’s an ever-looming threat of malware. Threats…