It has been reported that Cybercriminals are using a new phishing campaign that impersonates “secure messages” from private financial institutions such…
Browsing: Malware and Vulnerabilities
It has been reported this morning that Whole Foods has been hacked- the popular grocery chain recently acquired by technology giant Amazon, suffered…
A malware strain named Faceliker has been detected that can take over browsers and manipulate Facebook likes to promote social media content.…
As several outlets are reporting today, Deloitte, a “big four” accounting firm, has confirmed that its internal email systems were breached. It’s…
A new Android Trojan named “Red Alert 2.0” has been discovered and has targeted banks and social apps. Although it…
While 99% of Organizations Look to Align Risk and Performance Indicators to the Cybersecurity Framework, Automation and Staffing Remain a…
At the moment hackers use automated software to carry out large-scale attacks. As the artificial intelligence industry is involved in…
The University of Edinburgh have released results from a new study that reveals how personal information can be stolen from Fitbit fitness bands.…
CCLearner, a utility program used to clean unwanted files including temporary internet files and invalid Windows Registry entries from a computer,…
Check Point’s August Global Threat Impact Index shows Roughted remained the top malware, followed by Globalimposter and HackerDefender in third place …