Please turn on your JavaScript for this page to function normally.
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware

Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …

Regin spyware found on German Chancellery staff’s personal laptop

The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …

12 new malware strains discovered each minute

G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …

New ransomware delivered via Windows Remote Desktop Services

A new type of ransomware – dubbed LowLevel04 – is hitting users in Greece and Bulgaria. It is apparently delivered on the affected computers manually by the …

Fitbit trackers can easily be infected with malware, and spread it on

Security researcher Axelle Apvrille has managed to deliver malware to a FitBit Flex fitness tracker, and to spread the infection to any computer that the device is …

Malicious Google Chrome clone eFast serves ads, collects info

A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …

Exposing the most dangerous financial malware threats

Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …

Exposing the most dangerous financial malware threats

“Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial …

Android ransomware gets new, professional look thanks to Googles Material Design

“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …

Fake Android apps bypass Google Play store security

“ESET unveiled fake apps available at the official Google app store. Posing as popular game cheats, such as Cheats for Pou, Guide for SubWay and Cheats for SubWay, these …

Free tool to remove YiSpecter iOS malware

“Zimperium has released a tool to help iOS users that have been infected with the recently spotted YiSpecter advertising malware remove the threat from their devices. …

Winnti group’s attack platform is based on decade old malware

“Kaspersky Lab experts tracking the activity of the Winnti group have discovered an active threat based on a 2006 bootkit installer. The threat, which they name HDRoot …

Don't miss

Cybersecurity news