Artist Uses Malware in Installation

Artist Uses Malware in Installation

A piece of ‘art’ currently up for auction features six separate types of malware running on a vulnerable computer. Malware infection on a laptop can…

View More Artist Uses Malware in Installation
Global Hackers Are Thwarted by FBI, Europe in $100 Million Heist

Global Hackers Are Thwarted by FBI, Europe in $100 Million Heist

U.S. and European law enforcement officials on Thursday said they had dismantled a global organized cybercrime network, which used malware to steal banking login details…

View More Global Hackers Are Thwarted by FBI, Europe in $100 Million Heist
North Korean cyberspies deploy new malware that harvests Bluetooth data

North Korean cyberspies deploy new malware that harvests Bluetooth data

A group of North Korean state-sponsored hackers has developed and deployed a new strain of malware that harvests information about Bluetooth devices connected to Windows…

View More North Korean cyberspies deploy new malware that harvests Bluetooth data
WhatsApp discloses vulnerability that allowed Israeli spyware to be installed on iPhones

WhatsApp discloses vulnerability that allowed Israeli spyware to be installed on iPhones

A report from The Financial Times this afternoon details a vulnerability in WhatsApp that allowed attackers to inject Israeli spyware onto phones. The malicious code was…

View More WhatsApp discloses vulnerability that allowed Israeli spyware to be installed on iPhones
Hackers are collecting payment details, user passwords from 4,600 sites

Hackers are collecting payment details, user passwords from 4,600 sites

Hackers have breached analytics service Picreel and open-source project Alpaca Forms and have modified JavaScript files on the infrastructure of these two companies to embed…

View More Hackers are collecting payment details, user passwords from 4,600 sites
9 types of malware and how to recognize them

9 types of malware and how to recognize them

People tend to play fast and loose with security terminology. However, it’s important to get your malware classifications straight because knowing how various types of…

View More 9 types of malware and how to recognize them
Research: Cryptojacking is Out of Fashion Now

Research: Cryptojacking is Out of Fashion Now

According to new research, the likelihood that your browser will be infected with malware for hidden mining cryptocurrency is now much lower. Malwarebytes company, which develops…

View More Research: Cryptojacking is Out of Fashion Now
“An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack

“An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack

US food giant Mondelez is suing insurance company Zurich American for denying a $100 million (£76 million) claim filed after the NotPetya attack. The confectioner,…

View More “An act of war”: Zurich American refuses to pay out on cyber insurance policy following NotPetya attack
Slack warns investors of a high risk of cyber-attacks impacting stock performance

Slack warns investors of a high risk of cyber-attacks impacting stock performance

In documents filed with the Securities Exchange Commission today with the occasion of the company going public on the stock market, Slack is warning new…

View More Slack warns investors of a high risk of cyber-attacks impacting stock performance
Carbanak Source Code Unveils a Startlingly Complex Malware

Carbanak Source Code Unveils a Startlingly Complex Malware

A look under the hood of FIN7’s notorious Carbanak backdoor – the result of nearly 500 total hours of analysis across 100,000 lines of code…

View More Carbanak Source Code Unveils a Startlingly Complex Malware
%d bloggers like this: