The EU passed the NIS directive, its first ever cyber security rules

9 years ago

The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European…

Watch out the Satana ransomware is comining

9 years ago

A newly emerging strain of malware dubbed Satana, which was first spotted last week, appears to be basing itself on…

Unmasking malware’s use of TLS without flow decryption

9 years ago

Researchers devised a method to unmask malware's use of TLS without decrypting the data flow. The technique relies on analysis…

New Locky variant – Zepto Ransomware Appears On The Scene

9 years ago

New threat dubbed Zepto Ransomware is spreading out with a new email spam campaign. It is a variant of the…

Eleanor malware uses a Tor backdoor to control Macs

9 years ago

A malicious application named EasyDoc Converter.app delivers a sophisticated malware dubbed Eleanor malware that opens a Tor backdoor on the…

Yingmob Chinese Ad Company infected 10 million Android devices for click revenue

9 years ago

Chinese Ad company Yingmob ’s developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad…

Identity theft – Serving up coffee and fraud

9 years ago

Cifas, a leading group in fraud protection, recently released its report on the fraud landscape for 2016 and the numbers…

The Global Eye – The world is not only what we see

9 years ago

If we want to be realistic we must say that the world is not only what we see. Our linear…

Espionage SBDH Toolkit used to target European Countries

9 years ago

ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in…

Government wiretaps – You can’t stop what you can’t see

9 years ago

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true.…

This website uses cookies.