Google Bans Cryptocurrency Mining Chrome Extensions
A couple of day ago, Google announced that it will ban cryptocurrency mining extensions from the official Chrome Web Store. […]
Google Bans Cryptocurrency Mining Chrome Extensions Read More »
A couple of day ago, Google announced that it will ban cryptocurrency mining extensions from the official Chrome Web Store. […]
Google Bans Cryptocurrency Mining Chrome Extensions Read More »
Trend Micro security experts have found a new strain of Android cryptocurrency miner called ANDROIDOS HIDDENMINER. The malware abuses device
HiddenMiner Android Malware Can Brick Infected Devices Read More »
Last week, Apple released a brand new set of security patches to fix dozens of vulnerabilities impacting iOS, macOS, watchOS,
Apple Patches Dozens of Vulnerabilities Across All Platforms Read More »
Arbor Networks security experts warned about a new threat actor which attacks financial institutions in Japan via the Panda Banker
New Version of Panda Banker Trojan Attacks Japan Read More »
After the recent cyber attack in Atlanta, Baltimore 911 system was paralyzed by hackers for seventeen hours. During the weekend,
Baltimore 911 System Paralyzed by Hackers Read More »
Cisco Talos security experts found a brand new piece of malware called GoScanSSH. According to the experts, the new threat
GoScanSSH Malware Does Not Infect Government and Military Networks Read More »
Shortly after the scandal with Cambridge Analytica, Facebook is under pressure again. It became clear that the social network collected
Facebook Collected Android Users’ Call and SMS Data for Years Read More »
Atlanta officials reported that the computers in the city were infected by a severe ransomware attack. Last Thursday, the mayor
Computers in Atlanta Infected by Ransomware Read More »
Google reported that Spectre and Meltdown vulnerabilities keep infecting devices with Intel processors. Thus, the company releases additional security patches
Google Releases Additional Meltdown and Spectre Patches for Chrome OS Read More »
The experts at Palo Alto Networks found a brand new Android trojan called TeleRAT. The trojan uses Telegram Bot API
TeleRAT Android Trojan Uses Telegram to Exfiltrate Data Read More »
On Saturday, the Observer reported that the political research company Cambridge Analytica with ties to President Trump, had acquired 50
After the Security Breach, Facebook States Data Must be Regulated Read More »
The free service Coverity Scan, used by thousands developers for finding and fixing bugs in their open source projects, was
Hackers Abused Coverity Scan for Cryptocurrency Mining Read More »
Core Security researchers have found a remotely exploitable buffer overflow vulnerability which affects MikroTik RouterOS in versions older than its
Security Researchers Found Buffer Overflow Vulnerability in MikroTik RouterOS Read More »
A Chinese strain of malware called RottenSys managed to infect nearly 5 million Android devices. “The Check Point Mobile Security
The RottenSys Malware Hit 5 Million Android Devices Read More »
Qrypter RAT trojan infected 243 organizations worldwide last month. Currently, the popularity of the trojan keeps increasing. The Qrypter RAT
Qrypter RAT Trojan Infected Hundreds Organizations Worldwide Read More »