According to an article in the New York Times, the FBI asked a judge to help break encryption software all the way…
Browsing: Malware and Vulnerabilities
In the world of computers, viruses are not an uncommon thing to hear. Viruses are to computers what infections are…
Badlock was discovered by the Open Source Samba community and apparently underpins both Samba and Windows Server Message Block (SMB). The…
ESET researchers analysed a scam campaign on Facebook that spreads a malicious browser plugin via social engineering techniques. The attack…
What could be better than sitting in your favorite café, sipping latte and browsing whatever the drama of the day…
Carbon Black®, a leader in Next-Generation Endpoint Security (NGES), today announced the results from its first Unified Threat Research report,…
New dynamic classification ensures organizations worldwide are quickly protected from socially-engineered impostor emails, also known as business email compromise (BEC)…
Business and government leaders grapple daily with innovation’s double-edged sword: as new technologies introduce unprecedented levels of efficiency, speed, and…
Following the news that an SQL injection has been discovered on one of the corporate systems of the Panamanian lawyers…
An unidentified programmer with twitter handle leostone produce a tool that can generate the password used to decrypt a Petya encrypted…