Past few years have seen a significant increase in the number of browser extension users and as a consequence browser extensions are now at risk. Hack...
Few years back researchers, security firms and even press were interested to know about Mac malware as it was something new. Up till then, no one had ...
What Is It? It is the type of malware which does not reside in Hard Disk. It does not store any files on the secondary memory. It is usually attached ...
Mining cryptocurrency is becoming more and more popular with increase in the value and according to specialists around the world this value will only ...
Few years ago, we could only visualize a world where everything in our lives could be connected to internet and each other. But no longer this is the ...
The world is moving towards more secure web, leaving behind HTTP and adopting HTTPS, where ‘S’ stands for secure. In other words, HTTPS is the sec...
Seemingly scarier than the movie itself, a new ransomware named Annabelle has surfaced, that does what a ransomware does best. Hijack people’s compu...
Number of online scams have increased rapidly over the years. Scammers are developing new techniques to scam users out of their hard-earned money. Sca...
Who doesn't love to use free WiFi hotspots? They can be found at airports, malls, hotels, restaurant, café, and coffee shops. They are available to a...
In a recent turn of events, Tesla’s Amazon cloud account was taken apart by hackers and was used for mining cryptocurrency. This report was confirme...
We hear phishing attack stories that start from someone receiving an email with a request to change password or to answer a quiz to win a grand prize ...
Despite our email services filtering spam mails, spammers, always try to use new tactics to trick the users. The recent workaround found by them is, â...