Recently, the security experts at Palo Alto Networks discovered a brand new Trojan horse that used Telegram for data extraction. More precisely, it us...
Android devices are prone to malware attacks and infections. Malware can get into your Android device by different sources like free downloading websi...
Several companies put their trust on SIEM, Security Information and Event Management to handle security issues that they may encounter. Basically, SIE...
There is a little misconception about malware that it only exists on computers. However, what most of us are not aware of is that there are different ...
Smartphones come with different functionalities. We use them for almost every task that we do on our system. Like the computer, smartphones are also p...
As the threats and security breaches are increasing day by day, a new ransomware “Zenis” was found. It was discovered by MalwareHunterTeam this we...
Internet is a place full of hackers, spammers and malware. Anyone who is browsing internet can be a victim of these online scams and end up losing vit...
RedDrop is a malware capable of spying on its victims. It can collect data about a victim’s device, including data from a device’s memory card and...
Over the years Google Chrome has become a prominent web browser. Due to its smooth interface, fast performance and easy sync features it is liked by a...
Coincheck Reimbursed Funds Japan’s virtual cryptocurrency exchange Coincheck stated on Tuesday that they reimbursed more than $440 million to their ...
Recently at Security Analyst Summit renowned antivirus developer Kaspersky Lab found a cyber espionage threat malware called “Slingshot” that spie...
Scammers are everywhere, they are waiting for the opportunity to scam users and steal their hard-earned money. Another scam that has become very popul...