The security researchers at FireEye Abdulellah Alsaheel and Raghav Pande have found a way to exploit Microsoft EMET (Enhanced Mitigation…
Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know…
The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting…
The journalist Steven Petrow had his computer hacked while on a plane, it was a shocking experience that raises the…
A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still…
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs Project Cumulus…
The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The…
The experts at BleepingComputer reported a new strain of CTB-Locker for Websites, a new ransomware that mainly targets WordPress sites.…
Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of…
2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per…
This website uses cookies.