Love is purportedly in the air again, but is it being harnessed and channelled in the right direction? This Valentine’s…
Browsing: Malware and Vulnerabilities
What makes for a successful cyberattack? Technology is one part of the picture, clearly. Malicious cybercriminals make use of a…
Today the Ponemon Institute, in partnership with DomainTools, announced the results of its annual “Staffing the IT Security Function in…
The FBI has sent a security alert to the US private sector highlighting a hacking campaign targeting supply chain software…
GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam…
The personal information of over six million citizens was leaked after Benjamin Netanyahu’s Likud party uploaded the full register of Israeli…
A new threat report from cybersecurity company Dragos details the characteristics of a form of ransomware known as Ekans. This ransomware –…
As reported by Scamicide, there is a new phishing scam riding on the back of Google Docs attachments. A phishing email…
Attackers are exploiting the hype surrounding this year’s Oscar Best Picture nominated movies to infect fans with malware and to…
A trojan malware campaign is targeting online banking users around the world with the aim of stealing credit card information,…