Please turn on your JavaScript for this page to function normally.
Monero
RIG EK covertly delivers cryptocurrency miners

Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …

Ledger Nano S
Hardware wallet security is no match for scammers’ ingenuity

It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private …

Android
Tizi backdoor rooted Android devices by exploiting old vulnerabilities

Google has discovered and removed from Google Play a number of apps that contained the Tizi backdoor, which installs spyware to steal sensitive data from popular social media …

tech support scam
New scam launches users’ default phone app, points it to fake tech support hotline

The latest variants of tech support scams targeting Apple users have done away with the usual visually prominent error messages. Instead, they open the potential …

Netflix
Artful Netflix-themed phishing campaign can fool many

A recently spotted Netflix-themed phishing email campaign is so well crafted that it’s difficult for many less tech-savvy users to spot the scam. Extremely convincing …

Android malware
Millions download botnet-building malware from Google Play

Researchers have discovered a new batch of malicious apps on Google Play, some of which have been downloaded and installed on some 2.6 million devices. The apps’ …

Australia
Hackers go after Australian ICT, managed services providers

The Australian Cyber Security Centre (ACSC), which integrates the national security cyber capabilities and serves as a hub for collaboration and information sharing with the …

fish phishing
46,000 new phishing sites are created every day

An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s …

Samsung
How to spot malicious mobile apps

The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. …

close laptop
Stealthy Mughthesec Mac adware exposed: What it does, how to protect yourself

Mac malware is still a rare occurrence, so it’s no wonder that some of it can lurk, unnoticed for months, on random machines. The latest example falls more in the …

Facebook
Obscuring malicious Facebook links using the Open Graph Protocol

Most users click on links popping up in their Facebook News Feed without thinking twice about it, but it’s good to keep in mind that they can lead to malicious sites. …

mask
Hackers impersonate women online to get into target corporate networks

By all (online) accounts, Mia Ash was a pretty and successful photographer based in London, and she was looking for friendship and love on the Internet. Her LinkedIn account …

Don't miss

Cybersecurity news