
CleanMyPC Software Review
Created by MacPaw Inc. this neat program is aims to optimize a computer by cleaning up junk files and granting easier access to manual clean up of objects that are causing a computer to run slow. The program also has…
Created by MacPaw Inc. this neat program is aims to optimize a computer by cleaning up junk files and granting easier access to manual clean up of objects that are causing a computer to run slow. The program also has…
The Acecard Android Trojan has been around for quite some time. We wrote about Acecard in February this year, but in fact the malware has been attacking devices since 2014, when it was first detected. Back in February, the Trojan…
There’s a new Linux Trojan, dubbed Linux/NyaDrop, and it’s already reverse engineered by MalwareMustDie. This is in fact the same researcher that discovered Mirai. The Mirai IoT botnet was used in multiple attacks and had a global infection rate. The…
Android may also be prone to backdoor access – through a debugging feature in the OS bootloader. However, only devices that have firmware developed by Foxconn appear to be inclined to this vulnerability. The OS bootloader can act as a…
2016 has seen the highest rates of malware in terms of online shops running on platforms such as Magento and OpenCart. To conclude that, researcher Willem de Groot from Byte.nl has been analyzing online stores infected with malware since November…
A new case study by blockchain analytics startup Skry and infosec firm Terbium Labs has analyzed millions of URLs in order to outline the most popular sites for illegal Bitcoin trade. The researchers were also able to identify the most…
Critical vulnerabilities are often leveraged in attack scenarios, varying from denial-of-service to malware infiltration cases. A serious vulnerability was recently patched, the kind that would allow attackers to carry out denial-of-service attacks via the Berkeley Internet Name Domain (BIND) exploits.…
How much does the security industry make? According to the New IDC Worldwide Semiannual Security Spending Guide, the global revenue for security technology is expected to surpass $100 Billion in 2020. IDC forecasts that the revenue for security technologies (hardware,…
Just a few days ago a new systemd vulnerability was discovered in Linux by Andrew Ayer, Linux administrator and founder of SSLMate certificate company. As reported, the bug has the potential to kill a number of critical commands, in the…
Four previously unknown vulnerabilities were found in the Dell SonicWALL Email Security virtual appliance app by researchers at Digital Defense Inc. The researchers detected the flaws while developing new audit modules for its patented vulnerability scanning technology. The flaws should…
A new banking Trojan has been spotted targeting financial institutions on a global level. Dubbed Ordinaff, the banker is deployed in campaigns on networks of compromised organizations. Security researchers report that the Trojan has been active since January 2016, and…
AI is evolving every day, and every day we wake up to the next innovation which should ease our lives. Take Melody, the chatbot powered by artificial intelligence that resides within the Baidu Doctor app for both Android and iOS.…
Being a cyber security blog, we are used to mentioning MITRE mainly when it comes to disclosure of vulnerabilities (CVEs). However, the not-for-profit company “operates multiple federally funded research and development centers” and has now launched a competition with the…
Stealing from Dark Web users may seem ridiculous but it’s a crime that can get you charges! This is what happened to Michael Richo, a 30-something-year-old man from Connecticut who was caught stealing Bitcoin via fake login pages from users…
Scams over the phone continue to be quite profitable, as evident by three call centers in Thane district of Mumbai which brought a profit of over $75 million to the scammers. The call centers are already shut down by the…
Facebook is often targeted by spammers and scammers, scenarios which often lead to malware infiltration. Unfortunately, some of these campaigns may turn out to be more persistent than expected. Such a Facebook spam campaign, recently detected in France has caused…
Online stores are not safe anymore according to recent reports by Sucuri. First detected in March 2016, the Magecart malware has begun to gain momentum in it’s activity until May when it began to target well-known and large online retailer…
Security researcher Stacey Jury at IntaForesincs has shared some concerns in terms of iOS 10’s privacy, in particular Apple Safari’s private browsing mode. Apparently, Apple has changed some things in the private mode in Safari and it is now less…
A trojan horse, created by a hacking group, dubbing it FastPOS, has recently been updated with a new technique that causes infection via a bug in Windows Mailslots mechanisms. The new version of the POS malware is not only created…
If you are a Spotify Free user, perhaps you should be more careful since users have spotted malicious behavior, SCMagazine reports. According to several users of the free version of the service, ads are serving malware through the advertiser network.…