The black market for malicious Android software is heating up thanks to a rise in popularity of overlay malware.
Browsing Author: Tom Spring
Security experts estimate 12 million users have been enticed to download software from the French firm Tuto4PC whose programs and silently install backdoors on PCs.
Most alarming is not what’s new in Verizon’s 2016 Data Breach Investigations Report, rather what’s old and still causing chaos behind corporate firewalls.
Drive-by exploits install ransomware on outdated Android devices using a stolen Hacking Team exploit and the first weaponized Towelroot attack.
Was the Federal Bureau of Investigation justified in paying over $1.3 million for a hacking tool that opened the iPhone 5c of San Bernardino terrorist?
A report released Thursday shines a bright light on point-of-sales system attack targeting hospitality and retail businesses that could have earned cyber crooks a $400 million payday.
Messaging platform firm Viber is adding end-to-end encryption to 711 million of its users, becoming the latest tech firm to embrace encryption on a massive scale.
Apple and the FBI vow to work together to find compromise solution in encryption debate.
Tibetans along with journalists and human rights workers in Hong Kong and Taiwan have been targeted in campaigns using phishing emails laced with Microsoft RTF attachments that exploit four vulnerabilities.
Cisco Talos said that 3.2 million servers are vulnerable to the JBoss flaw used as the initial point of compromise in the recent SamSam ransomware attacks.