Crypto

VPN leaks affect 3 Major VPN vendors, only Hotspot Shield promptly fixed it

The website VPNMentor discovered that IP leak issues in three major VPN vendors, only Hotspot Shield VPN promptly fixed it. The…

8 years ago

Study confirms the trade of code-signing certificates is a flourishing business

According to a new study conducted by American and Czech researchers, the trade of code-signing certificates is a flourishing business.…

8 years ago

Cryptocurrency mining operations target Windows Server, Redis and Apache Solr servers online

Researchers from the ISC SANS group and the Anti-DDoS company Imperva discovered two distinct campaigns targeting Windows Server, Redis and Apache…

8 years ago

ComboJack Malware alters Windows clipboards to steal cryptocurrencies and payments

Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and…

8 years ago

Facebook improves link security infrastructure by implementing HSTS Preloading

Facebook has implemented HSTS preloading that instructs a browser to always use SSL/TLS to communicate with eligible websites. Facebook has…

8 years ago

Bitcoin-linked heist: thieves stolen 600 powerful computers in Iceland

Thieves steal 600 powerful computers in a huge heist in Iceland with the intent to use them for mining Bitcoin.…

8 years ago

Equifax confirmed additional 2.4 Million identifies affected by security breach

The results of the forensic investigation on the massive Equifax hack revealed additional 2.4 Million identities were involved in the security…

8 years ago

Changes in Apple’s iCloud Security Policies and Argument of China

Changes in Apple's iCloud Security Policies - Apple announced to relocating the encryption key for users data in China; from…

8 years ago

Evrial: The Latest Malware That Steals Bitcoins Using the Clipboard

Evrial is a cryptocoin malware stealer discovered by the researchers at ElevenPaths which takes control of the clipboard to get…

8 years ago

Counterfeit Code-Signing certificates even more popular, but still too expensive

Code-signing certificates are precious commodities in the criminal underground, they are used by vxers to sign malware code to evade detection.…

8 years ago

This website uses cookies.