New Malware Spread Through Fake Heartbleed Bug Removal Tool

New Malware Spread Through Fake Heartbleed Bug Removal Tool

We extensively covered the vulnerability in the OpenSSL protocol that put three-quarters of the internet at security risk recently and came to be known as ‘Heartbleed.’ Now, a malware is being spread masquerading as a ‘Heartbleed Bug Removal Tool.’

By On May 29, 2014 Respond
Add To Bookmark Add To Readlist  
VirusTotal Releases Malware Detection App Compatible With Mac

VirusTotal Releases Malware Detection App Compatible With Mac

VirusTotal is a Google-owned site that provides free tools to scan for viruses and other security threats. The company has now released a Mac-compatible version of its flagship VirusTotal uploader app, available for free.

By On May 28, 2014 Respond
Add To Bookmark Add To Readlist  
A Look At The Increasingly Complicated DDoS Landscape

A Look At The Increasingly Complicated DDoS Landscape

We recently reported how an attacker leveraged the servers of anti-DDoS services to launch a massive DDoS attack. This signifies a shift in the DDoS landscape, with the attacks getting more sophisticated. Here’s a bird’s eye view of this particular mode of cyber attack.

By On May 16, 2014 Respond
Add To Bookmark Add To Readlist  
New Facebook Scams Use Ghost Videos To Install Malware

New Facebook Scams Use Ghost Videos To Install Malware

Facebook is fast becoming a popular platform for hackers who use blatant scams to lure the users and install malware on their machines. A recent barrage of videos about ghosts or other supernatural phenomenon makes use of this technique to possibly compromise user accounts.

By On May 11, 2014 Respond
Add To Bookmark Add To Readlist  
‘The Moon’ Malware Found To Be Infecting Linksys Routers

‘The Moon’ Malware Found To Be Infecting Linksys Routers

Wireless routers have become a fairly common accessory for users at home and at office both. But if you have a Linksys router at either of the two places, you may be in trouble. A malware is currently targeting specific Linksys models.

By On February 19, 2014 Respond
Add To Bookmark Add To Readlist  
Protect Your Android Device With An Effective Firewall

Protect Your Android Device With An Effective Firewall

Google’s Android platform is a favorite among the authors of malicious apps and malware. Being open source, it’s just an easy target. If you use Android, the best thing to do is install a good enough firewall to ward off these security threats.

By On February 14, 2014 1 Response
Add To Bookmark Add To Readlist  
24-Year-Old Russian Author Of Notorious Banking Malware ‘SpyEye’ Pleads Guilty

24-Year-Old Russian Author Of Notorious Banking Malware ‘SpyEye’ Pleads Guilty

SpyEye malware kit has long been deemed as a huge threat for the banking industry. The kit enables hackers to infiltrate banking systems with ease and make away with money. The creator of the malware, Aleksander Panin, has now been arrested and has pleaded guilty.

By On January 30, 2014 1 Response
Add To Bookmark Add To Readlist  
A Russian Teenager May Have Caused The Huge Recent Target Data Leak

A Russian Teenager May Have Caused The Huge Recent Target Data Leak

Target was at the receiving end of significant customer backlash and criticism recently when hackers were able to steal 40 million customer credit card numbers. The hack, a fresh report says, may have been a result of a Russian teenager’s malware.

By On January 19, 2014 Respond
Add To Bookmark Add To Readlist  
Hackers Launched 11.7 Million Malware Attacks On PC Gamers In 2013

Hackers Launched 11.7 Million Malware Attacks On PC Gamers In 2013

Kaspersky Labs, in a recent report, has revealed that 2013 has been a particularly troublesome year for PC gamers. A total of 11.7 million attacks were launched by hackers, targeting PC gamers by using malware.

By On January 13, 2014 Respond
Add To Bookmark Add To Readlist  
Malware Targets Users Visiting Yahoo.com, Security Firm Reveals

Malware Targets Users Visiting Yahoo.com, Security Firm Reveals

In the past, Yahoo has been criticized often for its numerous security breaches. The company is yet again in difficult waters, with security experts citing that a malware is being used to target any Yahoo.com visitors.

By On January 5, 2014 Respond
Add To Bookmark Add To Readlist  
Hackers Get Cash Out Of ATMs Using Infected USBs

Hackers Get Cash Out Of ATMs Using Infected USBs

ATM machines may look fairly secure pieces of hardware but if they are running Windows XP and have a public USB port, they are no good. Researchers have now revealed how hackers used malware-laden USBs to hack into such ATMs to withdraw cash.

By On January 4, 2014 Respond
Add To Bookmark Add To Readlist  
Chinese Hackers Spyied On European Diplomats During G20 Meetings Using Malware

Chinese Hackers Spyied On European Diplomats During G20 Meetings Using Malware

Chinese hackers have earned a notorious reputation over the years, hacking into the machines of countless organizations. Now, a report from FireEye reveals that hackers based in China were able to access the computers of European diplomats during G20 meetings.

By On December 15, 2013 Respond
Add To Bookmark Add To Readlist  
New Android Malware Can Bug Your Handsets, Dial Premium Numbers

New Android Malware Can Bug Your Handsets, Dial Premium Numbers

With each passing day, malware directed towards Android users grows more and more sophisticated. Fresh discoveries have uncovered such malware which can bug your handset and even dial premium numbers from it.

By On December 11, 2013 Respond
Add To Bookmark Add To Readlist  
WhatsApp Conversations Stolen By Malicious Android Gaming App

WhatsApp Conversations Stolen By Malicious Android Gaming App

Google has recently identified an Android gaming app on its Play store which is potentially malicious and steals the users’ WhatsApp conversations. The app has been removed from the Play store.

By On December 9, 2013 Respond
Add To Bookmark Add To Readlist  
FBI Can Turn On Laptop Cameras Without The Indicator Lights

FBI Can Turn On Laptop Cameras Without The Indicator Lights

Some of our worst digital surveillance horrors have turned true. A Washington Post report claims that FBI can remotely turn on laptop’s cameras without the indicator light, a move which is seen as highly intrusive by many.

By On December 8, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook