Vulnerability

How The Version Control System is found to be Vulnerable

Now comes a case where we see that version control systems are getting affected by malware. It is seen how source code is no longer safe and are said to…

Read More
ransomware attacks

Do trend suggest more ransomware attacks in store

As we come out from the after the shock of ransomware attack, and gear up to protect ourselves from any future attacks, security experts say that such attacks are here…

Read More
Open EDR
Security Strategy

Better Security Strategies Needed to Counter Today’s Malware

The Cyber Security Threat landscape is evolving fast. Really fast. As a result, traditional anti-malware tools, which rely on traditional techniques, are no longer proving useful. Modern-day malware uses sophisticated…

Read More
SSL Traffic

Malicious SSL Traffic Doubles, So Do We Really Need SSL Certificates?

Studies point out that malicious SSL traffic is on the rise; ie, the volume of malicious content that’s transmitted in an encrypted manner via SSL/TLS has increased considerably. Well, that…

Read More
Mobile Malware

Svpeng – The Most Dangerous Mobile Malware

Another kind of malware has been recognized that focuses on the financial transaction. This kind of Russian malware, known as Svpeng, is affecting Mobile Banking applications in the United States….

Read More
BSNL 1

India’s BSNL Gets Customers to Change Modem Passwords due to Malware Attack

BSNL (Bharat Sanchar Nigam Limited), the state-owned telecommunications company in India, has reportedly had to advise broadband customers to change their default modem password after a malware attack on a…

Read More
Ghost Telephonist

Ghost Telephonist Hijacks Your Phone Number

Hackers have exploited a vulnerability in wireless networks that allows them to make calls and send messages from your phone number. Cyber security researchers have termed this attack “Ghost Telephonist.”…

Read More
malware

This Version Of Emotet Trojan Has A Spreader Feature

A new variant of the Emotet Trojan, with a feature that helps spread malware over internal networks, has been detected. This new Emotet Trojan was observed recently by researchers at…

Read More
Mac Fruitfly Malware

Mac ‘Fruitfly’ Malware Still Causing Stir

Anything that has to do with Apple Mac is sure to generate lots of interest and curiosity. So when the news broke out about a Mac malware outbreak, people just…

Read More
27471483121 2ffcb3d353 b e1500340770530

Cyber Thieves Incorporate Genuine Applications To A Malware

Malwarebytes, a cybersecurity firm identifies that the cyber criminals are around with a new strategy of infusing genuine apps into the malware to get a stipulated task done more effectively….

Read More

Page 24 of 25

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register