Security firm, Symantec, has discovered a counterfeit version of the encrypted messaging app Telegram, with malware built on the open source code. The…
Browsing: Malware and Vulnerabilities
Mobile app flaws could compromise industrial network infrastructure Seattle, Wash. -IOActive, Inc., the worldwide leader in research-driven security services, and Embedi, a cybersecurity…
News broke overnight that , a new variant of the HC7 Ransomware is in the wild that encrypts a victim’s files and appends…
News broke today that Carphone Warehouse has been handed a £400,000 fine after one of the company’s computer systems was compromised as a result of a cyber-attack in…
As ever: With Turla, nothing is quite what it seems. ESET researchers have found that Turla, the notorious state-sponsored cyberespionage…
AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined…
Dan Panesar, VP EMEA at Certes Networks: “The latest series of attempted hacks targeting organisations involved in next month’s Winter Olympics highlights just…
George Santayana famously observed that: “Those who cannot remember the past are condemned to repeat it.” In a year where…
Digital Defense, Inc., a leading security technology and services provider today announced that its Vulnerability Research Team (VRT) uncovered three…
Executive Summary Two vulnerabilities, potentially dating back to as far as 1995 and affecting almost all processors, have been disclosed…