malware

McAfee Labs Threat Report – many mobile apps still vulnerable

The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats.…

11 years ago

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

11 years ago

US State Department – Hackers still in the Email System

Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working…

11 years ago

PowerOffHijack malware spies on user when Mobile is off

Security researchers at AVG have discovered a new Android malware dubbed PowerOffHijack, which spies on users even when mobile is…

11 years ago

Superfish adware in the Lenovo laptops is a threat to the users

The presence of the Superfish software in Lenovo laptops exposes the users to serious risks of hacking. The researcher Graham…

11 years ago

The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of…

11 years ago

New Studies Proving Non Immediate Reaction of Antivirus Tools to Threats

It has been outlined that most antivirus software do not detect all the malware and other threats that they should,…

11 years ago

Carbanak cybergang swipes over $300 million from banks

Kaspersky discovered that a multinational gang of hackers dubbed Carbanak cybergang has stolen at least $300 million from 100 financial…

11 years ago

Anthem Breach: a Slow and Silent Attack

Experts at Check Point security firm analyzed the recent data breach suffered by Anthem, the nation’s second-largest health insurer. The…

11 years ago

How to remotely install malicious apps on Android devices

Security researchers discovered how to install and launch malicious applications remotely on Android devices exploiting two flaws. Security researchers have…

11 years ago

This website uses cookies.