DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…
TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users…
Obama Administration proposes giving courts more power to issue botnet injunctions, a measure necessary to fight the diffusion of malicious…
European Centre for Information Policy and Security (ECIPS) reported identity thefts to Skype, but the company refused to take down…
Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall.…
Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml…
British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack…
Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were…
The annual study published by Javelin Strategy & Research on identity fraud estimates that U.S. consumers actually suffered fewer losses…
Symantec revealed observed a significant drop in the number of Financial Trojans in 2014, a report includes a detailed analysis…
This website uses cookies.