New Version of GandCrab Ransomware Attack via Compromised Websites

The new version of GandCrab ransomware discovered that attack the target system using SMB exploit spreader through compromised websites that posed as a download site. GandCrab Ransomware Attack is wide spreading Ransomware...

Malware research and police combine to put cybercriminals behind bars

Law enforcement and malware research join forces to take down cybercriminals The primary purpose of malware analysis is to determine how a given piece of malware works, extract IOCs (Indicators...

Intel Paid $100,000 Reward to Team for Spectre 1.1, 1.2 CPU Level Vulnerability

Intel rewarded $100,000 for two security researchers to find the CPU Spectre level critical vulnerability which leads to leak confidential information through microarchitectural side channels. Newly discovered spectre level vulnerabilities are...

Polar Flow app exposes location of security personal around the globe

Reminiscent of the recent controversy surrounding the fitness-tracking app Strava, the tale involving Polar Flow shows how the sharing of seemingly innocuous – but potentially telltale – data can have...

Apple Security Updates for iOS, macOS, Safari

Apple security updates released and fixed a bug which exists in iOS, macOS, Safari,  iCloud for Windows, watchOs, tvOS,  iTunes for Windows. Along with this Apple also releases iOS 11.4.1 with USB Restricted Mode which...

Ammyy Admin compromised with malware again; World Cup used as cover

Website altered to serve a malware-tainted version of otherwise legitimate software with the global event in Russia acting as a smokescreen Users who downloaded the free remote administration tool Ammyy...

How to Ditch Your Perfectionist Mindset

My guest today is a serial entrepreneur, speaker, blogger, consultant and coach at Systems Scientist, podcaster, and author of Owning It: Embrace the Best and Worst Parts of You to...

Is cyber the perfect weapon? –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: ABC News For years, political leaders such as former US Secretary of Defense Leon Panetta have warned of...

Stolen digital certificates misused in Plead malware campaign discovered

D-Link and Changing Information Technologies code-signing certificates stolen and abused by highly skilled cyberespionage group focused on East Asia, particularly Taiwan ESET researchers have discovered a new malware campaign misusing stolen...

How to Get Great Advice

My guest today is an avid networker and mobile business strategist, chef, podcaster, and golfer.He is co-founder and Director of Business Development at ChamberDS.com. Chamber D.S. is a complete app...

APLICATIONS

#Deletefacebook Challenge Sees Elon Musk Delete Spacex and Tesla from Facebook

Posted on March 26, 2018 at 10:16 AM The challenge comes after a report which showed that Facebook had shared data of more than 50...

HOT NEWS