The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European…
A newly emerging strain of malware dubbed Satana, which was first spotted last week, appears to be basing itself on…
Researchers devised a method to unmask malware's use of TLS without decrypting the data flow. The technique relies on analysis…
New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the…
A malicious application named EasyDoc Converter.app delivers a sophisticated malware dubbed Eleanor malware that opens a Tor backdoor on the…
Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad…
Cifas, a leading group in fraud protection, recently released its report on the fraud landscape for 2016 and the numbers…
If we want to be realistic we must say that the world is not only what we see. Our linear…
ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in…
Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…
This website uses cookies.