A simple yet versatile malware called Raccoon Stealer that bypasses anti-spam filters looks like it is going to be a…
While most spyware is software-based, concerns are also being raised about hardware-based spyware, which is much more difficult to detect.
Google Play Store removed two fake ad blockers used by millions worldwide, the latest example of malicious apps found on…
A new threat group dubbed Lyceum is attacking “sectors of strategic national importance” in the Middle East. It is unclear…
Cybercriminals are getting smarter, so you must get smarter, too. These latest cybersecurity threats are trending — and not in…
Malware authors are increasingly using PowerShell script obfuscation to try to hack your systems. But there are several ways you…
Although there was a noted plunge in DDoS attacks in 2018, it appears that this attack method is again becoming…
With its end-to-end encryption, Facebook-owned WhatsApp was considered to be a highly secure app — until this serious vulnerability was…
How can small and medium-sized businesses protect themselves against the onslaught of cyberthreats? Begin with endpoint security.
G-Cleaner is just one example of many third-party applications that prove how easily people are duped into downloading malware.