Crazy About Pokemon Go? Beware of DroidJack Malware!
Pokemon Go, the mobile game which managed to combine reality and imagination in one, has caught the attention of millions […]
Crazy About Pokemon Go? Beware of DroidJack Malware! Read More »
Pokemon Go, the mobile game which managed to combine reality and imagination in one, has caught the attention of millions […]
Crazy About Pokemon Go? Beware of DroidJack Malware! Read More »
After exposing the crook who was behind the Ranscam ransomware, Cisco researchers decided to look deeper and managed to find
Jigsaw, AnonPop and Ranscam Ransomware May Share The Same Creator Read More »
A new free decryption tool with more than 160,000 keys starts playing on the victims` side, helping them restore their
No More Ransom Initiative: An Important Step in Fight Against Ransomware Read More »
Adwind RAT has been detected adding Mac systems to its target list but the payload it has been dropping on
Adwind RAT Targets Macs but Fails to Infect Them Read More »
A free decrypter that can be used to recover locked files by the Stampado ransomware is already available. Fabian Wosar,
Free Decrypter for Stampado Ransomware Released Read More »
Adult Player, a vicious pornography Android application, blackmails its users by taking photos of them. The app, which can`t be
Adult Porn App Blackmails Its Victims Using Their Own Photos Read More »
Cyber outlaws used the BlackMoon banking Trojan, also known as W32/Banbra, to steal the banking credentials of more than 100,000
BlackMoon Banking Trojan Targets South Korean Financial Institutions Read More »
Oracle’s Outside In Technology libraries found to contain 18 vulnerabilities which can result in major software cyberattacks. The dangerous Patch
Oracle SDK Flaws Target Major Software Products Read More »
Mozilla Firefox Web browser intends to improve users` security and ensure faster page loading by blocking certain Flash Player content.
Mozilla Firefox Reduces Flash Content For Security Reasons Read More »
In March, this year, the security researches noticed a new version of PowerWare ransomware which tries to imitate the popular
PowerWare Ransomware Decrypter Available Now Read More »
The “code hooking” technique exposes software products to malware exploitation. Researchers have found six vulnerabilities in the “code hooking” technique
Code Hooking Technique Used By Antivirus Programs Opens Doors For Cybercriminals Read More »
Only a month after the malware experts first noticed the Bart ransomware, the AVG security researcher Jakub Kroustek has developed
Free Decrypter For Bart Ransomware Released Read More »
A rival of the vicious CryptXXX ransomware may be rising in the face of the newcomer CrypMIC. As known, CryptXXX
CrypMIC: The Heir Of CryptXXX Ransomware Read More »
Security experts have recently found several remote code execution vulnerabilities in iOS and OS X. The vulnerabilities could allow cyber
Apple Devices Can Be Hacked With Image Files Read More »
When a new malware is soon-to-be-released, the developers unknowingly give the security researchers an opportunity to follow its progress from
Python-Based Ransomware HolyCrypt Distributed Unfinished Read More »