Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
A team of researchers from Indiana University discovered a number of XARA vulnerabilities in both Apple’s OS X and iOS…
The authors of the Stegoloader malware are exploiting digital steganography to keep the information-stealing under the radar and avoid detection.…
Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on…
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…
ThreatConnect has conducted further investigations on the Rombertik malware and traced a malicious sample they analyzed to a Nigeria-based man.…
The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…
The use of malicious Chrome extensions in the criminal ecosystem, so Google decided to restrict the use of extensions not…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…
This website uses cookies.