Home Tags Malicious

Tag: malicious

Android ransomware attacks have grown by 50 percent in a year

Cybercriminals are increasingly targeting mobile devices with malicious software, as more and more people use them to store their most personal data.

Hackers who took control of PC microphones siphon >600 GB from...

Enlarge (credit: Defense Advanced Research Projects Agency) Researchers have uncovered an advanced malware-based operation that siphoned more than 600 gigabytes from about 70...

Nowhere to hide: 9 new hacks coming to get you

Securitywise, the internet of things is going as badly as most computer security experts predicted.In fact, most vendors don’t fully appreciate the potential threats...

Researchers discover security problems under the hood of automobile apps

Enlarge / Some connected car apps may be like leaving owners' keys on the dash for malware to steal. In a presentation...

Google ranks Gmail malware targets: Here’s how your sector rates on...

Google's breakdown of Gmail customers who receive the most spam reveals that the real-estate sector is the prime target of emails with malicious attachments...

Dissecting Malware

Four-day course on reverse engineering There are just a handful of reverse engineers clustered at the very top of the information security profession.From March 30...

Mobile apps and stealing a connected car

The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years.The case in...

Divide Between Work, Personal Data on Android Breached

Researchers demonstrate how malicious apps can break into secure Android work containers on EMM managed phones.

Haven’t deleted your Yahoo account yet? There’s a new forged cookie...

We're! not! even! bothering! with! exclamation! mark! this! time! Yahoo! has issued a new warning of potentially malicious activity in user accounts.…

The 15 top malware threats facing you and your organisation

Computer viruses, malicious software, banking Trojans, and ransomware are just some of the nefarious ways hackers and cybercriminals are trying to turn your network...

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor.The attack compromised their devices and exfiltrated data...

New ASLR-busting JavaScript is about to make drive-by exploits much nastier

(credit: xxdigipxx) For a decade, every major operating system has relied on a technique known as address space layout randomization to provide a...