fbpx
Home Malware

Malware

Stuxnet is the most high-profile piece of malware crashing Windows 95 and 98

At the RSA Conference 2015  held in San Francisco, it was announced that Stuxnet could have blown its cover and failed its sabotage mission...

Verizon found Millions of Mobile Devices to be Infected with Malware

According to a Verizon's new report, Data Breach Investigations Report 2015, it comes out that "we have got 99 problems, and mobile malware isn't...

A Flawed Ransomware that Enables Victims to Evade Payment

A newly released strain of ransomware has been broken, allowing for victims to evade payment and access their locked data. The Scraper ransomware, is in...

Microsoft Addressed FREAK & Stuxnet Vulnerabilities

Microsoft has come up with the most important Patch Tuesday to address the "FREAK" security vulnerability, an encryption flaw that leaves device users vulnerable...

Xiaome Mi4 Detected with Preinstalled Malware

Bluebox, a mobile-security firm has discovered preinstalled malware and a host of other security issues with Xiaomi Mi 4 device. It seems...

100’s of Thousands WordPress Sites infected with Dangerous Malware

About 100,000 or more websites running the WordPress content management system have been compromised by mysterious malware that turns the infected sites into attack...

Who is Behind the sophisticated, stealthy Regin malware?

An advanced piece of malware has been uncovered, which has been in use as far back as 2008 to spy on governments, companies and...

Hackers use Citadel Malware to attack password management apps

IBM’s Trusteer researchers have discovered a new configuration of the Citadel malware that attacks certain password managers. The configuration activates key logging when certain...

Not Compatible Malware a threat to Mobile users of Enterprises

NotCompatible.A, which researchers discovered in 2012, acted as a proxy on infected devices, but it didn't cause any direct damage. The mobile malware's authors did not...

Expired security software are open invitation for Malware

Microsoft released research this week to prove the point in the most recent version of its Security Intelligence Report. They also highlighted the data...

Building Trojan Hardware at Home

Malware, Viruses and Trojan horse can destroy your computer and network; most of the time they are software based, but have you ever imagined...

FakeNet Malware Analysis

FakeNet is a tool that aids in the dynamic analysis of malicious software.  The tool simulates a network so that malware interacting with a remote...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...