Protecting America’s critical infrastructure must remain a priority

 America’s dependence on technology and web-based communication has forever changed the way government functions at every…

M4N1F3STO Virus Removal Guide

The M4N1F3STO Virus screen locker is a Trojan that displays a picture of what is intended…

Buying stolen data

 Should companies buy stolen data from third parties to combat credential reuse attacks against themselves? Herein…

Thieves Using Radio Jammers to Prevent Drivers from Locking Their Cars

British police are warning drivers to check their doors after they use their remote key to…

Five-Year-Old Bait-and-Switch Linux Security Flaw Patched

Maintainers of the Linux Kernel project have fixed three security flaws this week, among which there…

How to remove the CRITICAL_PROCESS_DIED or VinCE Tech Support Scam

The VinCE or CRITICAL_PROCESS_DIED Tech Support Scam is a Trojan from the Trojan.Tech-Support-Scam family that displays…

CERT Warns Users to Stop Using Two Netgear Router Models Due to Security Flaw

The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security…

The Week in Ransomware – December 9th 2016 – Osiris, PornoPoker, Popcorn Time, Locked-In, and More

A bunch of small ransomware variants were released, but we did have a new release of…