Page 310

Magento Sites Attacked & Are Now Delivering Malware

Magento Sites Attacked & Are Now Delivering Malware

Magento, a popular Content Management System and an open-source ecommerce platform implemented over 200,000 sites was recently targeted by attackers. ...

WARNING: Attempts of Cyber Attack on Northern Ireland Assembly

WARNING: Attempts of Cyber Attack on Northern Ireland Assembly

Amidst increasing cyber-attacks, warnings have been delivered by authorities of Northern Ireland to the staff members. Every day the world continues ...

Multiple Cities and Multiple Attacks: Cyber Attacks Create Havoc

Multiple Cities and Multiple Attacks: Cyber Attacks Create Havoc

Most of the U.S. cities and companies are finding themselves at more jeopardy after the latest ransomware attack on Atlanta. Data breaches are increas...

TeleRAT: A New Trojan Horse That Steals Your Data

TeleRAT: A New Trojan Horse That Steals Your Data

Recently, the security experts at Palo Alto Networks discovered a brand new Trojan horse that used Telegram for data extraction. More precisely, it us...

How To Remove Malware From Android Phone Or Tablet: Best Hacks

How To Remove Malware From Android Phone Or Tablet: Best Hacks

Android devices are prone to malware attacks and infections. Malware can get into your Android device by different sources like free downloading websi...

All You Need To Know About SOAPA

All You Need To Know About SOAPA

Several companies put their trust on SIEM, Security Information and Event Management to handle security issues that they may encounter. Basically, SIE...

Some Common and Popular Types of Android Mobile Malware

Some Common and Popular Types of Android Mobile Malware

There is a little misconception about malware that it only exists on computers. However, what most of us are not aware of is that there are different ...

Keep Your Android Smartphones Secure Using These Simple Tips

Keep Your Android Smartphones Secure Using These Simple Tips

Smartphones come with different functionalities. We use them for almost every task that we do on our system. Like the computer, smartphones are also p...

RottenSys Malware: Almost 2 Years and Still Counting!

RottenSys Malware: Almost 2 Years and Still Counting!

Mobile Security Team Check Point recently found a huge malware campaign that has already affected 5 million Android users. This means that more than 5...

Zenis: The Ransomware That Deletes Backup Files After Encryption

Zenis: The Ransomware That Deletes Backup Files After Encryption

As the threats and security breaches are increasing day by day, a new ransomware “Zenis” was found. It was discovered by MalwareHunterTeam this we...

How To Take Back Your Hacked System

How To Take Back Your Hacked System

Internet is a place full of hackers, spammers and malware. Anyone who is browsing internet can be a victim of these online scams and end up losing vit...

RedDrop New Malware Threat for Android Users

RedDrop New Malware Threat for Android Users

RedDrop is a malware capable of spying on its victims. It can collect data about a victim’s device, including data from a device’s memory card and...