Phishing is an Endpoint Problem, Not a Credential Problem ANN ARBOR, MICH. Duo Security, a cloud-based trusted access provider protecting…
Browsing: Malware and Vulnerabilities
A new Hidden-Tear ransomware impersonates a PokemonGo application for Windows and targets Arabic victims. These features include a backdoor Windows account, spreading the executable to other…
In response to the news that Linux.Lady, a Go-based Linux Trojan that mines cryptocurrency, has been uncovered by researchers Ken Bechtel,…
A data breach at large UK software company Sage may have compromised personal information for employees at 280 UK businesses,…
Nemucod, the Trojan that affected Ireland worst in 2016 is back with a new campaign. Instead of serving its victims ransomware, it…
New research paper from IOActive shows half of vehicle vulnerabilities could put hackers in the driving seat IOActive, the worldwide…
Three-year study by IOActive that has found half of vehicle vulnerabilities could allow cyber attackers to take control of a…
The Met is currently using 27,000 computers running on Windows XP. For the last two years, XP has no longer…
Following the news that Check Point uncovered and announced a new Android vulnerability, Spencer Cobb, VP of Strategy & Business Development at Cyber…
Up to 100 million cars could be unlocked and potentially stolen by simply copying the radio frequency used in remote…