Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C….
Read MoreHackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C….
Read MoreThe words “Linux” and “cryptojacking” are the two words we usually do not see in the same sentence. But it seems like cybercriminals are expanding beyond the traditional Windows computers…
Read MoreThe Antivirus Company Avast issued an alert on Monday about the spread of a virus that attempts to infect Brazilians smartphones and steal consumers’ banking data. The malware is called…
Read MoreResearchers have discovered the Facebook account network, which uses Libyan themes and information to spread malware to tens of thousands of people over a five-year period. Links to Android and…
Read MoreThe Five Eyes alliance (New Zealand, Australia, Canada, UK and the United States) allegedly launched a takedown-level cyber attack and large-scale industrial espionage against Russia’s biggest search engine and web…
Read MoreWe rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for hackers to target. MacOS with its BSD underpinnings and minority market…
Read MoreWhat is Botnets? Botnets are artificial networks created by malware, which can be controlled by the virus author remotely. Here in Hackercombat.com, we have featured stories of companies which had…
Read MoreAny person who has ever used a computer has probably heard the term “malware.” It is everywhere, and the general consensus is that we have to be careful and protect…
Read MoreWe are in the age of computing where programs are growing to a point towards feature-richness at best and bloatware at worst. Malware itself is also software, developers creating malware…
Read MoreHackers are always on the lookout for vulnerable websites into which they could inject malware and use the same to distribute malware or other potentially harmful applications into users’ systems/devices….
Read More