malware

Reading the Verizon Data Breach Investigation Report 2014

Verizon Data Breach Investigation Report 2014, to better understand how attackers can affect company business, and learn the proper countermeasures.…

12 years ago

A malicious Chrome browser extension is stealing your digital coins

A user raised an alert on Reddit, on the presence of a malicious Chrome browser extension, on the official store,…

12 years ago

An overview on the Bad Bot Landscape by Distil Networks

Distil Networks security firm has published an interesting report on the Bad Bot Landscape, it is full of data on the…

12 years ago

The novelties inside the last critical update for P2P Zeus

Which are the security improvements in the critical update proposed by criminal ecosystem for P2P Zeus Botnet? Fortinet experts detected…

12 years ago

The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…

12 years ago

Symantec on a fake voting campaign used to steal Facebook credentials

Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim's credentials.…

12 years ago

New Zeus trojan variant digitally signed in the wild

Security researchers at Comodo have detected a new Zeus trojan variant enhanced with digital signature of its source code to…

12 years ago

Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from "360 Mobile Security" detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of…

12 years ago

F-Secure has discovered MiniDuke malware samples in the wild

Security Experts at F-Secure discovered a collection of pdf documents, that had references to Ukraine, containing MiniDuke malware samples. MiniDuke…

12 years ago

How Coremex malware monetizes search engine Hijacking

F-Secure has identified a malware dubbed Coremex that takes advantage of plugin functionality provided by browsers to hijack search engine…

12 years ago

This website uses cookies.