RottenSys Malware: Almost 2 Years and Still Counting!
Mobile Security Team Check Point recently found a huge malware campaign that has already affected 5 million Android users. This means that more than 5 million users might...
APT Slingshot Infection on The Roll Through Routers
Recently at Security Analyst Summit renowned antivirus developer Kaspersky Lab found a cyber espionage threat malware called “Slingshot” that spies on user’s systems through routers. Security Researchers at...
Beware! Website Notifications May be Spamming Your Browser
Despite our email services filtering spam mails, spammers, always try to use new tactics to trick the users. The recent workaround found by them is, “web notification spam”....
How Hackers Attacked PyBitmessage to Steal Bitcoin Wallet Key
What is Zero-Day Vulnerability? These are security flaws unknown to developers and attacks that take advantage of this vulnerability are called Zero Day attack. What is Bitmessage? It...
Hide and Seek: New Botnet Threat
Internet of Things refers to devices connected to Internet; it can be your fridge, car, smartwatch or any other object. As is visible around us, it is growing...
WannaMine: A New Threat on Rise
As sophistication of attacks continues to grow, mentioning them as a catalyst to booming business won’t be a hyperbole. Eternal Blue the security exploit created by NSA and...
Top 10 Malware Myths and Facts (2024 Updated Guide)
We are always surrounded by modern technology, it is changing the way we use to do things. More and more devices are getting connected and instigating risk to...
Zyklon Malware -Exploits Microsoft Office Vulnerabilities Again
Zyklon, an HTTP botnet malware revamped after 2016 by exploiting the vulnerabilities present in Microsoft Office. Security researchers at FireEye reported that a malware named Zyklon, capable of...
Difference Between Virus, Worm and Trojan Horse
Often people mix terms like worms, trojan, spyware, they use them whenever there is a discussion on computer virus. But let me tell you using them interchangeably is...
Trojan horse! Take Prevention
Trojan horse is a type of malware which poses as a legitimate software or is attached on a genuine software or file and infects the system. It can...
Life Threatening Malware: Triton
Recently security researchers have revealed another dangerous piece of malware targeting industrial control systems (ICS). The infectious code dubbed Triton and is also known as Tisis, designed to...
Leakbase Is Reportedly Dead!
DDoS Attack bids farewell to Leakbase DDoS attack is rapidly increasing both in terms of frequency and severity. Recently, a website known Leakbase went offline following DDoS Attack....