Should be “Shot at sunrise” is the opinion of U.S. politician Michael C.Burgess, the representative for Texas, when talking about…
Browsing: Malware and Vulnerabilities
News has surfaced that the US nuclear weapons force in the Pentagon is still relying on 1970s technology, including floppy disks…
ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries. The most notable detection…
Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment. Almost 3 terabytes of data stolen…
Mobile Application Security still has a long way to go, especially when you look at the Hewlett Packard Enterprise (HPE)…
An increasingly diverse range of connected objects has joined the Internet of Things (IoT) in recent years. Whilst the IoT…
Following the news of an Anonymous hacker gaining access to Turksih citizens’ hospital information, David Emm, Principal Security Researcher at…
With the news of the Pavlok wristband which conditions wearers into good behaviour by using shock therapy, Liviu Itoafa, security researcher at…
The growing risks of mobile apps Cyber attacks in general are an ever-present danger, that much is clear. With more…
Researchers at Forcepoint have discovered an email campaign distributing double zipped files with Windows Script Files (WSFs) inside which, when…