Breaking News

The EU passed the NIS directive, its first ever cyber security rules

The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European…

10 years ago

Watch out the Satana ransomware is comining

A newly emerging strain of malware dubbed Satana, which was first spotted last week, appears to be basing itself on…

10 years ago

Unmasking malware’s use of TLS without flow decryption

Researchers devised a method to unmask malware's use of TLS without decrypting the data flow. The technique relies on analysis…

10 years ago

New Locky variant – Zepto Ransomware Appears On The Scene

New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the…

10 years ago

Eleanor malware uses a Tor backdoor to control Macs

A malicious application named EasyDoc Converter.app delivers a sophisticated malware dubbed Eleanor malware that opens a Tor backdoor on the…

10 years ago

Yingmob Chinese Ad Company infected 10 million Android devices for click revenue

Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad…

10 years ago

Identity theft – Serving up coffee and fraud

Cifas, a leading group in fraud protection, recently released its report on the fraud landscape for 2016 and the numbers…

10 years ago

The Global Eye – The world is not only what we see

If we want to be realistic we must say that the world is not only what we see. Our linear…

10 years ago

Espionage SBDH Toolkit used to target European Countries

ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in…

10 years ago

Government wiretaps – You can’t stop what you can’t see

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…

10 years ago

This website uses cookies.