Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware

Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware

With over 2.5 billion monthly active users that have accumulated since its fruition, Android has seen massive growth over the last 10 years. With so…

View More Is Your WhatsApp Being Weird? You May Need to Check For Hidden Malware
25 Million Android Phones Infected With Malware That ‘Hides In WhatsApp’

25 Million Android Phones Infected With Malware That ‘Hides In WhatsApp’

As many as 25 million Android phones have been hit with malware that replaces installed apps like WhatsApp with evil versions that serve up adverts,…

View More 25 Million Android Phones Infected With Malware That ‘Hides In WhatsApp’
APT Increasingly Targets Canadian Orgs

APT Increasingly Targets Canadian Orgs

Canadian organizations are being warned that they are increasingly becoming the targets of cyber-threats, with researchers discovering nearly 100 malicious email campaigns that have been…

View More APT Increasingly Targets Canadian Orgs
China installs spyware on tourists’ Android phones, downloads data from iPhones

China installs spyware on tourists’ Android phones, downloads data from iPhones

Foreigners visiting certain areas of China are having their smartphones searched at the border. With Android phones, authorities install a piece of spyware that has…

View More China installs spyware on tourists’ Android phones, downloads data from iPhones
New Dridex Malware Strain Avoids AV Detection

New Dridex Malware Strain Avoids AV Detection

A new variant of the Dridex banking Trojan has been shaken up with the ability to avoid detection by traditional antivirus products. Dridex is a…

View More New Dridex Malware Strain Avoids AV Detection
What is malware? How to prevent, detect and recover from it

What is malware? How to prevent, detect and recover from it

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access…

View More What is malware? How to prevent, detect and recover from it
Botnet Abusing Android Debug Bridge, SSH is Back

Botnet Abusing Android Debug Bridge, SSH is Back

A new cryptocurrency-mining botnet malware is abusing Android Debug Bridge (ADB) and SSH, according to Trend Micro. “This attack takes advantage of the way open…

View More Botnet Abusing Android Debug Bridge, SSH is Back
Website Attack Attempts Rose by 69% in 2018

Website Attack Attempts Rose by 69% in 2018

Millions of websites have been compromised, but the most likely malware isn’t cyptomining: it’s quietly stealing files and redirecting traffic, a new Sitelock report shows.…

View More Website Attack Attempts Rose by 69% in 2018
Process Reimaging: A Cybercrook’s New Disguise for Malware

Process Reimaging: A Cybercrook’s New Disguise for Malware

As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even some gaming consoles. However, it…

View More Process Reimaging: A Cybercrook’s New Disguise for Malware
Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group's Servers

Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group’s Servers

If nation-sponsored hacking was baseball, the Russian-speaking group called Turla would not just be a Major League team—it would be a perennial playoff contender. Researchers…

View More Nation-Sponsored Hackers Likely Carried Out Hostile Takeover Of Rival Group’s Servers