Trend Micro spotted 36 malicious apps advertised as security tools in Google Play

8 years ago

Researchers from Trend Micro have discovered 36 malicious apps on Google Play that are posing as security tools of major firms.…

BlackBerry Mobile Website hacked, crooks installed a Coinhive’s code to mine Monero

8 years ago

According to Coinhive, the BlackBerry Mobile website was hacked by exploiting a critical security vulnerability in the Magento e-commerce software.…

Microsoft KB4056892 Meltdown/Spectre patch bricks AMD Athlon-powered machines

8 years ago

Many users claim the Security Update for Windows KB4056892, the Microsoft Meltdown/Spectre patch, bricks AMD Athlon-powered machines. Meltdown and Spectre…

Experts found a strain of the Zeus banking Trojan spread through a legitimate developer’s website

8 years ago

Malware researchers at Talos group have discovered a strain of Zeus banking Trojan that abuses the legitimate website of the Ukraine-based…

US National Security Agency Director Admiral Mike Rogers to Retire

8 years ago

After a four-year term, the National Security Agency Director Admiral Mike Rogers plans to retire, he sent a letter to its staff…

Spear phishing attacks already targeting Pyeongchang Olympic Games

8 years ago

Hackers are already targeting the Pyeongchang Olympic Games with spear phishing attacks aimed at stealing sensitive or financial information. Security…

Security Affairs newsletter Round 144 – News of the week

8 years ago

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Once again…

Following recent mass demonstration, Iran Infy group may attempt to target protesters and their foreign contacts

8 years ago

Following the recent mass demonstration, the Iran-linked Infy group may attempt to target protesters and their contacts abroad. The crackdown…

A new stack-based overflow vulnerability discovered in AMD CPUs

8 years ago

Google expert discovered a new stack-based overflow vulnerability in AMD CPUs that could be exploited via crafted EK certificates, Chip…

CoffeeMiner – Hacking WiFi networks to mine cryptocurrencies

8 years ago

A developer published a proof-of-concept project dubbed CoffeeMiner for hacking public Wi-Fi networks and mine cryptocurrencies. The spike in the values of…

This website uses cookies.