malware

Iran has foiled a cyber attack against the oil ministry

Iran - The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack  originated from US against the…

11 years ago

Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing…

11 years ago

Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server…

11 years ago

Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft…

11 years ago

Who and why is attacking companies in the Nordic Countries?

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries.…

11 years ago

Criminals are using SVG Files to serve malware

Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files.…

11 years ago

Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware…

11 years ago

Cyberattacks on Oil and Gas Firms Launched with no Malware at all

Oil and gas industry targeted by hackers with a genuine looking windows file, not a malware. The attacks are ongoing…

11 years ago

Mass-Scale Abuse of poorly configured SOHO Routers

Several dozen Imperva Incapsula customers were targeted by a DDoS botnet comprised of tens of thousands of hijacked SOHO routers.…

11 years ago

Mac PCs are unprotected against malware

Patrick Wardle is a former NSA staffer that turned to a security researcher, the expert explained that his main concern…

11 years ago

This website uses cookies.