The US continues to be the top country hosting domains that serve web-based threats and, and the main source for exploit kits on a global level, according to new research.
Security researchers have discovered that the MEGA Chrome extension had been compromised to steal login credentials and cryptocurrency keys. Once it was discovered that the extension was replaced with a malicious variant, Google removed the extension from the Chrome Web Store.
Hackers rooted in the white-hat part of the business moonlight as bank robbers, pouring their knowledge and skills into creating and modifying malware that allows them to infiltrate financial institutions.
Although there is nothing special about code executing on a machine, when this code is executed is a significant detail from a security standpoint.
A security researcher has found a method that can be used to easily identify the public IP addresses of misconfigured dark web servers. While some feel that this researcher is attacking Tor or other similar networks, in reality he is exposing the pitfalls of not knowing how to properly configure a hidden service.
Attackers compromising MikroTik routers have configured the devices to forward network traffic to a handful of IP addresses under their control.
Account information belonging to 569,703 players of Mortal Online massively multiplayer online role-playing game (MMORPG) is currently available online on database exchange forums.
Despite Google's defenses for the official Android marketplace, cybercriminals still manage to sneak in a banking Trojan, or two, or three, security researchers have discovered.
Malicious developers hoping to catch more victims pushed to Google Play a fake client for Yandex's voice assistant, Alisa, security researchers discovered in August.
Fraudulent tech-support services buying advertising space from Google has grown in sophistication to a level that the platform cannot distinguish them from legitimate providers.
Every once in a while you come across a really strange malware and such is the case with a new ransomware that only encrypts .EXE files on a computer. It then displays a screen with a picture of President Obama that asks for a "tip" to decrypt the files.
This week users of Avast's antivirus product have reported Internet problems after performing an upgrade of a product. If users also have Malwarebytes installed, reports are coming in that Avast is causing conflicts with that program as well.
Even the ransomware developers seem to be taking a last minute summer vacation as it was only small variants released, with a few being in development. I am hoping this is just a continual decline in new ransomware, but we will not know for sure until we start moving into September.
This week a new CryptoJoker ransomware variant was discovered called CryptoNar that has infected victims. The good news, is that a free decryptor was quickly released so that these victims can get their files back for free.
Philips evaluated one of its products and discovered that it was vulnerable to nine different security bugs, one of them of critical severity.
CCleaner 5.46 was released yesterday and aims to fix all of the problems that led to the fiasco with the previous release of CCleaner 5.45. With this release, Piriform has added settings that allow you to actually disable their background monitoring process and to disable the sending of anonymous usage statistics.
A new academic study shows that a regular smartphone can act as a sonar system and steal sensitive information based on the victim's finger movement on the screen.
Following weeks of Twitter dispute, Bitfi finally admits what people in the security industry thought from the first moment they heard about the "unhackable" hardware wallet: probably not.