The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However,…
Browsing: Malware and Vulnerabilities
ESET researchers have discovered over 80 malicious apps disguised as mods for Minecraft with nearly million installs on the official…
A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that…
A new proof-of-concept exploit known as DoubleAgent can not only hijack third-party Windows antivirus software, but use said software to…
A security researcher has published a vulnerability and proof-of-concept exploits in Google’s Internet of Things security cameras, marketed as Nest…
New Corero study reveals a rise in number of DDoS attacks since 2016, with 56 percent of security teams viewing…
A new WikiLeaks Vault 7 leak titled “Dark Matter” claims, with unreleased documents, that the Central Intelligence Agency has been bugging “factory…
Over the past six months, the number of Locky ransomware infections has gone down and is expected to reach an…
Prague, Czech Republic. Avast , the leader in digital security products for business and consumers, revealed that more than half…
Much of the excitement surrounding the WikiLeaks “Vault 7” release of purported CIA documents concludes that the CIA has broken encryption. We…