Three zero-day vulnerabilities were exposed after an attempted attack on a high-profile human rights activist’s iPhone. Apple responded quickly by releasing a patch to address the bugs.
A recent surge in tech support scams show that this particular method of coercion is still thriving. New tactics and avenues of attack deceive people who are more familiar with the traditional techniques. Find out how to spot and manage these scams.
Cybercriminals are quick to cash in on the Poke-madness. Following the discovery of a malicious version of Pokemon GO app, a fake lockscreen app was recently discovered.
Dallas-based Omni Hotels & Resorts announced that point-of-sales (PoS) systems at some of its properties were hit by malware targeting payment card information.
Apart from understanding the ransomware tactics and techniques beyond encryption, it is equally important to understand how they arrive in the environment.
Researchers discovered an information-stealing and spying malware named Qarallax, a remote access trojan targeting Swiss nationals who use Skype to seek help with U.S. visa applications.
How are cybercriminals using routers to obtain user information? Domain Name System (DNS) changer malware can be used on routers to redirect users to malicious versions of legitimate sites.