Hackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C….
Read MoreHackers broke the file server of the Pale Moon browser project and attacked the previous version of the browser with malicious software. The lead developer of Pale Moon, Mr. C….
Read MoreIt may be irritating, your screen is full of ads, and when you close one, another appears. Yes, we are talking about adware. What is adware? Adware is synonymous with…
Read MoreSometimes known as computer forensics, data forensics refers to the process of investigating digital data or programs in order to find out how it was created and what it is…
Read MoreJust like the operating system itself, application software needs to be updated regularly in order to prevent the possibility of fixed security vulnerability from being taken advantage of by 3rd…
Read MoreSecurity experts have been using isolated real-world systems in order to forensically study malware for ages. These ‘honey pots’ are very productive instruments for developing countermeasures against malware. The quarantined…
Read MoreSince 2008, Google has been warning the public to only source their apps from the official Google Play Store and not from 3rd party unknown app suppliers. Cybersecurity issues with…
Read MoreThe Emotet family of banking malware has made an enormous resurgence for a couple of weeks now, targeting bank customers using a new batch of trojan-infested email spam. The new…
Read MoreThe North Korean elite hacker team Lazarus has been wreaking havoc to many Automated Teller Machines located in Africa and Asia for the last two years. Dubbed the FastCash attacks,…
Read MoreThe Emotet malware, which the US government warned about in July, has been provided with a new feature that allows it to steal all e-mails of 180 days and newer…
Read MoreAfter lying low for a couple of years, the Kronos trojan reemerged in July with a new name Osiris. A more extensive investigation of how the banking trojan has evolved,…
Read More