Malware or malicious computer code has been around in some form or other for over 40 years, but the use…
Development
Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will…
Learn how to update Adobe Flash Player, to help protect against malware attacks. Source: Read More
An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out many…
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who…
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first…
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses…
The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for…
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access…
Microsoft’s .NET framework, which is used to build millions of websites and online applications, is taking further steps to go…
APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being…
ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them…
For ordinary laptop and smartphone users, Wi-Fi is not ideal – but it’s sometimes near-inescapable. Source: Read More
Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center…
Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is…
The long-term health effects of electronic cigarettes – or E-cigarettes – are still open for discussion – but the devices…
It’s easy to imagine that ALL connected devices – from fridges to CCTV cameras – are a security nightmare, but…
Self-driving cars are just around the corner, with the UK government putting up £10 million (around $15.6 million) for cities…
Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to…
Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been…