Google Chrome Malware Hijacks Your Facebook Account
Isn`t it strange that all of a sudden a Facebook friend`s feed is flooded with obscene clickbait and sketchy links? […]
Google Chrome Malware Hijacks Your Facebook Account Read More »
Isn`t it strange that all of a sudden a Facebook friend`s feed is flooded with obscene clickbait and sketchy links? […]
Google Chrome Malware Hijacks Your Facebook Account Read More »
It became clear that cyber criminals could have been exploited a vulnerability in the Mac OS X firewall Little Snitch
Vulnerability In Mac OS X Firewall Little Snitch Exposed Systems To Danger Read More »
The official website of the well-known Remote Desktop Software Ammyy Admin was hacked by cybercriminals and compromised to spread Lurk
Legitimate Website Spreads Lurk Banking Trojan Read More »
SFG, a member of the Furtim malware family, was until now believed to be specifically targeting European energy companies but
SFG`s Real Purpose Finally Exposed Read More »
The Symantec security experts have found a brand new version of the Android.Fakebank.B banking trojan which inhibits outgoing calls to
Android Trojan Cancels Customers’ Outgoing Calls To Banks Read More »
This year, Locky has been one of the most popular ransomware families. According to Avira security experts, now the threat
Blocking C&C Connections Unable To Stop Locky Ransomware Read More »
The Android malware which intercepts incoming calls to bypass two-factor authentication systems appeared earlier this year. Recently, the experts at
Android.Fakebank.B Trojan Blocks Outgoing Calls To Banks Read More »
The Neutrino Exploit Kit has found another way to diversify its repertoire of attacks. According to the recent news, the
Researcher’s IE Exploit Code Finds Its Way Into Neutrino Exploit Kit`s Artillery Read More »
In case you are one of the numerous victims of CryptXXX ransomware, you might get a chance to recover your
CryptXXX Creators Offer Free Decryption Keys For Selected Versions Of The Ransomware Read More »
Scientists found a brand new strain of malware named cuteRansomware which launches from a Google Doc to host the decryption
cuteRansomware Alerts A Dangerous Move To The Cloud Read More »
Security experts have just noticed a new malware which gives victims 96 hours to pay a ransom before it starts
Stampado Ransomware Keeps Files As Hostages Read More »
Microsoft reported that it has fixed the CVE-2016-3238 Print Spooler vulnerability which lets attackers hack any version of Microsoft Windows.
CVE-2016-3238 Windows Vulnerability Allows Hacking Companies Via Printers Read More »
The Nymaim malware family was popular in 2013, though it has recently appeared again on the threat horizon. According to
Nymaim Malware Made An Impressive Comeback Read More »
Over the past days, the developers of Locky ransomware have intensified their operations and distributed thousands of spam emails containing
Massive Campaign Involves Locky Ransomeware Version Working Offline Read More »
The latest statistics released by Microsoft, shows that the Cerber ransomware infections have accounted for a quarter of all ransomware
Cerber Ransomware Attacks Increased Massively For The Past Month Read More »