Cyber Crime

InterContinental Hotels investigating a possible card breach

The company InterContinental Hotels Group (IHG) confirmed an ongoing investigation of alleged card breach at some of its properties. The…

9 years ago

Dreaded KillDisk Malware now includes Ransomware abilities

Researchers at security firm CyberX have recently discovered a variant of the KillDisk malware that also implements ransomware features. KillDisk is…

9 years ago

Android Switcher Trojan targets routers changing DNS settings

Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change…

9 years ago

The number of ICS Attacks continues to increase worldwide

According to data provided by IBM Managed Security Services, the number of ICS attacks in 2016 continues to increase worldwide.…

9 years ago

Hacked Sony Music Entertainment account tweeted about Britney Spears’s Death

Hackers compromised the Sony Music Entertainment Twitter account and posted the messages on Britney Spears's Death. Experts blame OurMine crew.…

9 years ago

Malware distribution tactics used in phishing campaign

Experts from Proofpoint discovered a new phishing campaign designed to steal banking data leveraging tactics associated with malware distribution. Security…

9 years ago

Hackers want to take down Xbox Live and PSN on Christmas Day

Christmas time is a critical period for the gaming industry that is threatened by hackers that want to paralyze their…

9 years ago

Fraudsters are stealing money from several Groupon users

Many Groupon customers reported massive theft after crooks have placed orders in their name by using victims' credentials likely retrieved…

9 years ago

New Alice ATM Malware, a lightweight and efficient threat

Alice ATM malware is a new threat targeting ATMs discovered by researchers at Trend Micro  as part of a joint…

9 years ago

Linux/Rakos, the new Linux malware threatening devices and servers

A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan. A…

9 years ago

This website uses cookies.