New Backdoor and DDoS Trojan Targeted To The Linux Computers Towards the end of the last year, after being attacked by the new ma... Read more »
- Latest Post
More Headlines
Finally Petya Ransomware Has Fixed And No Need To Pay Ransom
Finally Petya Ransomware Has Fixed And No Need To Pay Ransom. At the last month there is a new variety of ransomware exploded into t... Read more »
Amazon Sold Malware Infected Security Cameras
Amazon Sold Malware Infected Security Cameras. Mike Olsen who is an Independent Security Researcher found that the CCTV observatio... Read more »
Two Researchers Discover Two-Factor Authentication Weak Spots Into Cyber Security
Two Researchers Discover Two-Factor Authentication Weak Spots Into Cyber Security The Two-Factor Authentication or you can say 2FA... Read more »
Google Fixes 8 Critical Android Bugs
Google Fixes 8 Critical Android Bugs On Monday, Google announced that it initiated rolling out the monthly Android security update ... Read more »
Bug In Apple Siri Allowed To Access Your Contacts And Photos
Bug In Apple Siri Allowed To Access Your Contacts And Photos To overcome the annoying activation lock bug found in iOS 9.3 , the l... Read more »
Malicious Chrome Extension Can Hijack Your Browser
Users Reported About The Hijacking Of Chrome Extension When users reported that the Better History Chrome extension started taking... Read more »
"Rollout" Patching Tool Became Problem For iOS App Developers
Hackers Abused The iOS App Patching Tool "Rollout" Prone One more hot-patching solution for iOS applications have anal... Read more »
Exploitable Flaw In TrueCaller App Found By Security Researchers
Exploitable Flaw In TrueCaller App Found By Security Researchers The security researchers of Cheetah Mobile Security Research Lab ha... Read more »
TeslaCrypt Ransomware Could Infect Your Hard Drives
TeslaCrypt Ransomware Could Infect Your Hard Drives A new Ransomware dubbed “Teslacrypt” had been exclusively for PC Game addicts. A... Read more »
Hackers Spreading Locky Ransomware Virus Through Social Engineering Hoaxes
Hackers Spreading Locky Ransomware Virus Through Social Engineering Hoaxes. It is considered as the most tactical ransomware ever cr... Read more »
Cryptolocker A Trojan Ransomware, Popularity Known As "Police Virus"
Cryptolocker A Trojan Ransomware, Popularity Known As "Police Virus". CryptoLocker is the most prevalent ransomware of all ... Read more »
Top Media Websites Are Hitting By The Malvertising Campaign
Top Media Websites Are Hitting By The Malvertising Campaign A large malvertising campaign affects many websites like MSN, NYT,... Read more »
Flaw In The Code.org Exposes Volunteer Email Addresses
Flaw In The Code.org Exposes Volunteer Email Addresses Code.org is an organization where students learn computer science. This wee... Read more »
The Google Chrome Extension That Steals Users Bitcoin
From Users The Bitcoin Is Stolen Which Is Caught By Chrome Extension Bitstamp (Slovenia-based Bitcoin exchange portal) is warning the ... Read more »
According To Researchers Java Security Is Still Vulnerable
According To Researchers Java Security Is Still Vulnerable Polish security firm Security Explorations researchers are claiming tha... Read more »
Most Of The Cloud Services Are Still Vulnerable To DROWN And Heartbleed Attack
Most Of The Cloud Services Are Still Affected By DROWN And Heartbleed Vulnerability Due to the DROWN attack, the cloud serv... Read more »
Adobe Flash Player Fixed Critical Vulnerabilities And Released Security Update
Adobe Flash Player Fixed Critical Vulnerabilities And Released Security Update. The newly released security updates for Adobe Flas... Read more »
Google Patches 19 Vulnerabilities In Android
Google Patches 19 Vulnerabilities In Android Recently, Google has released the security update for its Android Nexus devices(Andro... Read more »