Security News
Hillary Clinton’s Campaign Chairman Hacked
The Twitter account of Hillary Clinton’s campaign chairman John Podesta was hacked on October 12. As usual, the breached Twitter account was used to
The Twitter account of Hillary Clinton’s campaign chairman John Podesta was hacked on October 12. As usual, the breached Twitter account was used to
Serpico ransomware is a new variant of DetoxCrypto cryptovirus. It infiltrates the system, executes itself and demands ransom fee from the victims. It doesn’t
A Security Expert Stated That Android Devices That Have Foxconn Firmware May Hold a Secret Backdoor. Foxconn Firmware may Expose Android Devices The security
The Cisco Talos Security team has created a specialist tool LockyDump which extracts the configuration parameters of Locky infections. ` LockyDump Aids Locky Victims
MalwareMustDie discovered and reverse engineered a new Linux Trojan that is made to target Internet of Things (IoT) devices. NyaDrop Appears with Dangerous Intrusions
Exotic 2.0 is the updated version of the Exotic ransomware virus. The virus extension remains the same – .exotic. The relatively short timeframe between
The Nuclear #55 ransomware is the newest variant of the Nuke family of ransomware, follow this guide to learn more about it and remove
The Cerber 4.0 ransomware is the latest version of the Cerber family of malware, learn how to remove it by reading our guide. Cerber
Symantec announced some observations from the past three months. They have monitored a major increase in the number of email-based attacks that use malicious
The DROWN security vulnerability is a large-scale bug that is found in 33% of all web servers and exposes them to potential data theft.