
Trickbot can download new capabilities onto a victim’s device (as well as updating those it has already deployed) without interaction from the victim.

AdaptiveMobile Security researchers say they’ve discovered a new vulnerability, nicknamed Simjacker, that’s being used to surveil people’s devices by an unnamed surveillance company. The technique sends SMS messages containing instructions for an old S@T Browser app supported on some carriers’ SIM cards.

Most malware will work on every Windows system between XP Service Pack 3 and Windows 10, so if you find you’re more familiar with XP, then don’t be afraid to use it.

ZombieLoad microarchitectural data sampling (MDS) as its technical name — which can leak sensitive data stored in the processor, such as passwords, secret keys and account tokens and private messages.

Hackers looking for a quick buck will go for the low-hanging fruit – and if that can be achieved by locking down a small business with ransomware, or breaching their network to steal credit card information and other personal data, that’s what they’ll do.

It might seem like a concept born from Altered Carbon’s stack technologies, but according to cyber-security firm Kaspersky Lab and the University of Oxford Functional Neurosurgery Group, cyber-attacks might not always be limited to the physical when it comes to our health.

Malware threats come without warning and can wreak havoc on an environment. If a user’s device or information is compromised, he or she may have to wait for IT to rectify the issue. Part of the waiting process is determining which type of threat is causing harm.

We manage so many of our daily activities online that the web has inevitably turned into a giant pool of personal data, which is exposed to a variety of risks, as was the recent case with Facebook.

Most attacks against routers leverage vulnerabilities or mis-configurations of the firmware. Routers are crucial pieces of hardware that act as gateways between private networks from the public internet, and yet security patches and firmware updates are rarely issued by vendors or deployed by end users due to the complexity of the operation.

keylogger – a program that sends typed characters to an attacker. The keylogger is deactivated by default but could represent a privacy concern if an attacker has physical access to the computer.