A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of…
As Australia's newly approved Data Retention law comes into effect, how does the law actually affect the average coutry internet…
Millions of users looking to get software updates have downloaded an app hiding a spyware called SMSVova through the official…
Roman Seleznev, the son of the prominent Russian Parliament member Valery Seleznev was sentenced to 27 years in jail for…
According to researchers at FireEye, Chinese hackers targeted the South Korean Terminal High Altitude Area Defense (THAAD) missile system. According…
Security researcher warn of hackers compromised thousands of Windows boxes using leaked NSA hack tools DOUBLEPULSAR and ETERNALBLUE Security expert Dan…
WikiLeaks published the user guide related to the hacking tool allegedly used by the CIA, code-named Weeping Angel, to hack…
A new report published by Kaspersky confirms that Stuxnet exploits targeting a Windows Shell Vulnerability is still widely adopted by…
Security firm Flashpoint published an interesting paper titled, 'Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies' about cybercriminal communications of threat…
This website uses cookies.