Investigating several domains registered using the email address drake.lampado777@gmail[.]com. IBM Security X-Force spotted the information-stealing malware named Corebot. The Corebot’s…
Browsing: Malware and Vulnerabilities
The evidence from 2015 is clear: traditional signature-based end-point protection is ineffective against the modern attack, which is persistent and…
You’d be forgiven for wondering where to start when it comes to IT security in this brave new world of…
LockerPIN sets or changes the device’s PIN lock, unbeknownst to the user as it locks the screen and demands a…
2015 has seen some of the most crippling data breaches in history. In February, health insurance provider Anthem revealed a…
The Los Angeles Times is reporting that a data breach at eight California State campuses exposed the personal information of…
Security experts from VASCO, Spikes Security and STEALTHbits commented on the latest hack of health insurer excellus that may have…
Examines some of the key security features of Amazon Web Services and provides tips on best practice If you’re considering…
The study of real-word events helps illustrates the different types of cyberattack and how to deflect them In series of case…
Issue of Microsoft’s September 2015 Patch Tuesday includes five critical bulletins, two of which tackle remote code execution flaws affecting…