Cyber Crime

Double check if your Bitcoin/Ethereum wallet is exposed online, crooks are running massive Internet scans

Security experts are observing numerous massive scans going on for Bitcoin and Ethereum wallets in order to steal their funds.…

8 years ago

Crooks set up a fake Symantec Blog to spread the macOS Proton malware

A new strain of the notorious macOS Proton malware is spreading through a blog spoofing the legitimate blog of the security…

8 years ago

Unbelievable: Uber concealed data breach that exposed 57 Million records in 2016

Unbelievable: Uber concealed data breach that exposed 57 Million records in 2016 and paid hackers to delete stolen records. Uber…

8 years ago

BankBot Trojan bypasses again security checks implemented by Google for the Play Store

Experts from several security firms has spotted two new malware campaigns targeting Google Play Store users, once of them spreads…

8 years ago

Experts observed a new wave of wp-vcd malware attacks targeting WordPress sites

Experts from the firm Sucuri observed a new wave of wp-vcd malware attacks that is targeting WordPress sites leveraging flaws…

8 years ago

Cash Converters suffered a data breach, users of the old webshop are at risk

Cash Converters suffered a data breach, its old webshop that was withdrawn on 22 September was hacked and attackers gained unauthorised…

8 years ago

A second variant of the new Cryptomix Ransomware released in a few days

Malware researchers at MalwareHunterTeam discovered a new variant of the CryptoMix ransomware, the second one in just a few days. A new variant…

8 years ago

A new EMOTET Trojan variant improves evasion techniques

Security experts at Trend Micro had recently observed a new variant of the EMOTET banking Trojan that implements new evasion…

8 years ago

City of Spring Hill in Tennessee still hasn’t recovered from ransomware attack

In early November, the City of Spring Hill, Tenn, suffered a ransomware attack, but it still hasn't recovered from attack…

8 years ago

Terdot Banking Trojan is back and it now implements espionage capabilities

The Terdot banking Trojan isn't a novelty in the threat landscape, it has been around since mid-2016, and now it is…

8 years ago

This website uses cookies.