Malware

Raccoon Stealer malware newest business email compromise attack

A simple yet versatile malware called Raccoon Stealer that bypasses anti-spam filters looks like it is going to be a…

1 day ago

8 telltale signs your system has been infiltrated by spyware

While most spyware is software-based, concerns are also being raised about hardware-based spyware, which is much more difficult to detect.

2 months ago

Google Play Store removes fake ad blockers downloaded by millions

Google Play Store removed two fake ad blockers used by millions worldwide, the latest example of malicious apps found on…

2 months ago

Lyceum hacker group targeting Middle East energy sector

A new threat group dubbed Lyceum is attacking “sectors of strategic national importance” in the Middle East. It is unclear…

3 months ago

Top cybersecurity threats for the rest of 2019 — and beyond

Cybercriminals are getting smarter, so you must get smarter, too. These latest cybersecurity threats are trending — and not in…

4 months ago

PowerShell script obfuscation: Fight back against this growing threat

Malware authors are increasingly using PowerShell script obfuscation to try to hack your systems. But there are several ways you…

6 months ago

DDoS attacks experiencing major resurgence

Although there was a noted plunge in DDoS attacks in 2018, it appears that this attack method is again becoming…

6 months ago

WhatsApp spyware attack: Everything you need to know

With its end-to-end encryption, Facebook-owned WhatsApp was considered to be a highly secure app — until this serious vulnerability was…

7 months ago

10 endpoint security issues every SMB faces — and what to do about them

How can small and medium-sized businesses protect themselves against the onslaught of cyberthreats? Begin with endpoint security.

7 months ago

Windows PC utility ‘G-Cleaner’ a front for malware

G-Cleaner is just one example of many third-party applications that prove how easily people are duped into downloading malware.

7 months ago