Encryption has long been established as the safest method of protecting data transfers and communication on the Internet. Over half…
Browsing: Malware and Vulnerabilities
Following the news that Amber Rudd’s Call for Whatsapp Messages to be Available to security services. IT security experts from Avast,…
The adware would like to be your device administrator if you let it In our ongoing hunt for malicious apps…
What to secure first There is a seemingly constant influx of news regarding cloud adoption trends, but what seems to…
Analysis reported on Bleeping Computer that during the past year, Let’s Encrypt has issued a total of 15,270 SSL certificates that contained the…
The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However,…
ESET researchers have discovered over 80 malicious apps disguised as mods for Minecraft with nearly million installs on the official…
A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that…
A new proof-of-concept exploit known as DoubleAgent can not only hijack third-party Windows antivirus software, but use said software to…
A security researcher has published a vulnerability and proof-of-concept exploits in Google’s Internet of Things security cameras, marketed as Nest…