Three Monero Mining Malware Apps Found on Play Store
Hackers, website owners or even cybercriminals are finding new ways to use cryptocurrency miners to make easy money…
October 31, 2017
Ships Are Vulnerable to Cyber Attacks Due To Maritime Platform Flaw
Previously it was reported that hackers can take over ships by exploiting critical vulnerabilities in VSAT communication system.…
October 29, 2017
iPhone apps can access cameras to secretly take photos and record videos
There was a time when Apple devices were considered secured when compared to Android devices. Although the situation…
October 28, 2017
Researchers hack vacuum cleaner; turn it into perfect spying device
According to the findings of Check Point researchers, there is a vulnerability in the LG smart home infrastructure…
October 27, 2017
EternalRomance NSA Exploit a Key Player in Bad Rabbit Ransomware Mayhem
Two days back we reported about the havoc caused by Bad Rabbit ransomware throughout Europe but mainly in…
October 27, 2017
This malware turns itself into ransomware if you try to remove it
IT security researchers at SfyLabs have discovered an Android banking malware called LokiBot that converts itself into a fully…
October 26, 2017
jQuery Blog Gets Hacked – Hackers Compromise CoinHive’s DNS
In two different incidents, security of high profile platforms was compromised. These platforms include jQuery and CoinHive. jQuery…
October 26, 2017
Bad Rabbit ransomware spreading like wildfire but there is a way out
Ransomware attacks are on an all-time rise lately. This particular news is about another widespread ransomware campaign that…
October 25, 2017
Fake Cryptocurrency Apps on Play Store Stealing User Data
The US-based cryptocurrency exchange service Poloniex, which happens to be the largest exchange service in the world with…
October 24, 2017
Reaper malware outshines Mirai; hits millions of IoT devices worldwide
Last year the world was startled when Mirai malware managed to infect a whopping 500,000 IoT devices and…
October 23, 2017