Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed to extort victi ...
According to the ICO Baby monitors are still open to hackers across the UK, the ICO issued a list of recommendations to avoid privacy breaches. Early this year, the Shodan search engine launched a ...
A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomwar ...
A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed ...