A group of malware authors has come up with a new method of transcending an infection…
Category: Security
Researchers Point Out "Theoretical" Security Flaws in AMD’s Upcoming Zen CPU
The security protocol that governs how virtual machines share data on a host system powered by…
The NSA eavesdrops on in-flight mobile use too
If you’ve been taking your sensitive phone calls at 30,000 feet, well, it’s time to stop.…
Facebook Spam Campaign Uses Chrome Extension to Spread Nude Celebrity PDFs
Spammers are mass-messaging Facebook users with PDF files claiming to contain nude celebrity pictures, but which…
Asian Hackers Stole Technical Trade Secrets from German Steelmaker ThyssenKrupp
ThyssenKrupp, one of the world's largest multinationals and one of the leading steel producers, said today…
New Scheme: Spread Popcorn Time Ransomware, get chance of free Decryption Key
A in-development ransomware was discovered called Popcorn Time that intends to give victim's a very unusual…
Crooks Start Deploying New "August" Infostealer
During the month of November 2016, a cyber-crime group has started deploying a new malware family…
Hackers Attacking Russia Will Face up to 10 Years in Prison According to New Bill
The Russian Parliament is working on a new law that would introduce criminal liability for hackers…