WannaHydra – The Latest Malware Threat

WannaHydra – The Latest Malware Threat For Android Devices

The Antivirus Company Avast issued an alert on Monday about the spread of a virus that attempts to infect Brazilians smartphones and steal consumers’ banking data. The malware is called…

Read More
Malware Definition

What is Malware?

Any person who has ever used a computer has probably heard the term “malware.” It is everywhere, and the general consensus is that we have to be careful and protect…

Read More
Open EDR
Rally’s and Checkers’ POS Infection Since 2015 Exposed 1

Rally’s and Checkers’ POS Infection Since 2015 Exposed

Did you patronize one of the Rally’s food joints and Checkers Drive-In restaurants since December 2015? Then this news is for you: The two drive-through food chains with 100+ branches…

Read More
Tax System Down To Malware Attack

Wolters Kluwer Cloud Accounting & Tax System Down To Malware Attack

Tax Accounting Firm Wolters Kluwer, valued at $4.8 billion is currently suffering a severe malware attack that forced the company to take down their tax returns database since May 6,…

Read More
  • Web Malware Attack: The Different Stages [Infographic]

Web Malware Attack: The Different Stages [Infographic]

Discussing the different stages of web malware attack, explaining how the malware makes its entry, how it gets distributed and then the other stages, namely exploit, infection and the execution….

Read More
A Nastier Use of Memes Discovered To Remote Control A Trojan Horse

A Nastier Use of Memes Discovered, To Remote Control A Trojan Horse

Security experts have been using isolated real-world systems in order to forensically study malware for ages. These ‘honey pots’ are very productive instruments for developing countermeasures against malware. The quarantined…

Read More
Smart Security Implementation Will Reduce Cyber Risk

Smart Security Implementation Will Reduce Cyber Risk

In spite of the cybersecurity business progressing at a promising rate, malware keeps on plaguing businesses. Indeed, it was discovered that the greater part of the data breach has occurred…

Read More
Unpatched Remote Code Execution in Ghostscript Revealed by Google

Unpatched Remote Code Execution in Ghostscript Revealed by Google

Ghostscript, a mainstream raster image processor and back-end raster image converter for PDF has been discovered of harboring a critical vulnerability, a zero-day remote code execution flaw. Ghostscript is an…

Read More
Typewriters are productive again” the aftermath of Mat Su’s Ransomware Attack

Ransomware Attack forced Employees to use Typewriters Again

Time travel has been proven at last, but not the type we saw from the Back-in-the-Future and The Time Machine films, but like a dress-rehearsal of a dystopia brought about…

Read More
Cryptomining Malware Affects 42 Percent Organizations in February Study Report

Cryptomining Malware Affects 42 Percent Organizations

The cryptomining malware seems to be evolving as a trend worldwide these days; a recent study reveals that in February cryptomining malware had affected 42 percent organizations across the world….

Read More

Page 1 of 2

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register