Malware researchers at Trend Micro just discovered a new exploit package they have dubbed “Underminer,” which delivers an infectious bootkit to a system’s boot sectors. They have also uncovered a…
Read MoreMalware researchers at Trend Micro just discovered a new exploit package they have dubbed “Underminer,” which delivers an infectious bootkit to a system’s boot sectors. They have also uncovered a…
Read MoreUnlawful crypto mining, also known as cryptojacking, is taking the digital landscape by storm, secretly introducing itself into cryptocurrency mining programs of all kinds. The product itself, which may not even be actual malware, devours processor…
Read MorePowerShell is Microsoft’s new method for enabling system and network administrators to work with command lines, providing them with a more advanced scripting system where they can automate routine tasks….
Read MoreIn the early July, suspicious action around 2.3 million Bitcoin wallets was discovered, all of which appeared to be full-blown hacks in the making. The attackers utilized malware — known…
Read MoreGoogle Chrome is definitely one of the most popular web browsers being used today—but could it also be one of the riskiest? Hackers, as we know, are perpetually after whatever…
Read MoreAccording to a recent survey report, many big IT decision-makers see Enterprise Communication and Collaboration (EC&C ) apps like Slack, Dropbox, etc as being vulnerable to cyberattack. The survey was conducted…
Read MoreTurns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible devices. The reports say that the newly discovered…
Read MoreProofpoint, a cybersecurity firm has announced in their study that Japan, Poland, and Germany banks are in the crosshairs of a new variant of the Kronos bank trojan. Kronos was…
Read MoreThe top accounting firm, EY, has now acquired the technology assets and the patent of Crypto-Asset Accounting Tax (CAAT). This technology was launched to connect the cryptocurrency exchange, which will…
Read MoreGDPR is finally here, and it’s time to start discussing how its various legal aspects will affect data security in the wake of the new regulations. Let’s begin with a…
Read More