Security News
Fake VPN Services Trick Users Into Using Them
In the last few years security researchers discovered an increasing number of fake VPN services that trick users into paying for counterfeit privacy protection.
In the last few years security researchers discovered an increasing number of fake VPN services that trick users into paying for counterfeit privacy protection.
Computer hackers are actively exploiting a critical issue (CVE-2017-0199) in Microsoft Word via a large-scale email campaign, read our article to learn more about
This guide will give you detailed technical information and removal instructions about the Lambert Toolkit which is also known under the alias of Longhorn.
The infamous Cerber ransomware is being actively spread by computer hackers via a dangerous vulnerability identified in the Apache Struts 2 application. Apache Struts
Malware researchers alerted of a new virus threat called the NotAHero ransomware which can be easily removed by following our detailed guide. NotAHero Ransomware
Security experts from Google and Lookout uncovered a new dangerous Pegasus Malware evolved strain which is made for the Android operating system. The Pegasus
Researchers Uncovered a dangerous attack campaign that delivers the BrickerBot malware that is able to literally destroy IoT devices. BrickerBot IoT Malware Spreads Rapidly
Computer criminals have devised a new threat known as the Cerberos ransomware which can be removed by reading our in-depth guide. Cerberos Ransomware Description
The Kampret ransomware is a test version of a Hidden Tear based strain which has already infected targets worldwide. Kampret Ransomware Description Malware researchers
The Stolich ransomware is a new iteration of the EDA2 open-source malware family which can be removed easily by reading our complete removal guide.