What happens when the Yin meets the Yang? It brings about balance on a cosmic level. The advent of the decentralized Blockchain technology and with it...
Mobile Security Team Check Point recently found a huge malware campaign that has already affected 5 million Android users. This means that more than 5...
Recently at Security Analyst Summit renowned antivirus developer Kaspersky Lab found a cyber espionage threat malware called “Slingshot” that spie...
Despite our email services filtering spam mails, spammers, always try to use new tactics to trick the users. The recent workaround found by them is, ...
What is Zero-Day Vulnerability? These are security flaws unknown to developers and attacks that take advantage of this vulnerability are called Zero D...
Internet of Things refers to devices connected to Internet; it can be your fridge, car, smartwatch or any other object. As is visible around us, it is...
As sophistication of attacks continues to grow, mentioning them as a catalyst to booming business won’t be a hyperbole. Eternal Blue the security ex...
We are always surrounded by modern technology, it is changing the way we use to do things. More and more devices are getting connected and instigating...
Zyklon, an HTTP botnet malware revamped after 2016 by exploiting the vulnerabilities present in Microsoft Office. Security researchers at FireEye repo...
Often people mix terms like worms, trojan, spyware, they use them whenever there is a discussion on computer virus. But let me tell you using them int...
Trojan horse is a type of malware which poses as a legitimate software or is attached on a genuine software or file and infects the system. It can se...
Recently security researchers have revealed another dangerous piece of malware targeting industrial control systems (ICS). The infectious code dubbed ...