Malware News

Google Play: A Host For Cryptocurrency Malware

Google Play: A Host For Cryptocurrency Malware

What happens when the Yin meets the Yang? It brings about balance on a cosmic level. The advent of the decentralized Blockchain technology and with it...

RottenSys Malware: Almost 2 Years and Still Counting!

RottenSys Malware: Almost 2 Years and Still Counting!

Mobile Security Team Check Point recently found a huge malware campaign that has already affected 5 million Android users. This means that more than 5...

APT Slingshot Infection on The Roll Through Routers

APT Slingshot Infection on The Roll Through Routers

Recently at Security Analyst Summit renowned antivirus developer Kaspersky Lab found a cyber espionage threat malware called “Slingshot” that spie...

Beware! Website Notifications May be Spamming Your Browser

Beware! Website Notifications May be Spamming Your Browser

Despite our email services filtering spam mails, spammers, always try to use new tactics to trick the users. The recent workaround found by them is, ...

How Hackers Attacked PyBitmessage to Steal Bitcoin Wallet Key

How Hackers Attacked PyBitmessage to Steal Bitcoin Wallet Key

What is Zero-Day Vulnerability? These are security flaws unknown to developers and attacks that take advantage of this vulnerability are called Zero D...

Hide and Seek: New Botnet Threat

Hide and Seek: New Botnet Threat

Internet of Things refers to devices connected to Internet; it can be your fridge, car, smartwatch or any other object. As is visible around us, it is...

WannaMine: A New Threat on Rise

WannaMine: A New Threat on Rise

As sophistication of attacks continues to grow, mentioning them as a catalyst to booming business won’t be a hyperbole. Eternal Blue the security ex...

Top 10 Malware Myths and Facts (2024 Updated Guide)

Top 10 Malware Myths and Facts (2024 Updated Guide)

We are always surrounded by modern technology, it is changing the way we use to do things. More and more devices are getting connected and instigating...

Zyklon Malware -Exploits Microsoft Office Vulnerabilities Again

Zyklon Malware -Exploits Microsoft Office Vulnerabilities Again

Zyklon, an HTTP botnet malware revamped after 2016 by exploiting the vulnerabilities present in Microsoft Office. Security researchers at FireEye repo...

Difference Between Virus, Worm and Trojan Horse

Difference Between Virus, Worm and Trojan Horse

Often people mix terms like worms, trojan, spyware, they use them whenever there is a discussion on computer virus. But let me tell you using them int...

Trojan horse! Take Prevention

Trojan horse! Take Prevention

Trojan horse is a type of malware which poses as a legitimate software or is attached on a genuine software or file and infects the system. It can se...

Life Threatening Malware: Triton

Life Threatening Malware: Triton

Recently security researchers have revealed another dangerous piece of malware targeting industrial control systems (ICS). The infectious code dubbed ...