RCSAndroid - one of the most professionally developed and sophisticated Android malware
Trend Micro researchers found that among the leaked files is the code for Hacking Team’s open-source malware suite RCSAndroid (Remote Control System
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
There are lots of ways that government spies can attack your computer, but a U.S. drone company is scheming to offer them one more. Boeing subsidiar
Mobile Spy Software Maker mSpy Hacked
mSpy, the makers of a software-as-a-service product that claims to help more than two million people spy on the mobile devices of their kids and part
Critical “Ghost” Remote Code Execution Vulnerability
In some PHP-applications revealed the potential exploitation of critical vulnerability GHOST (CVE-2015-0235), which allows to organize code execution
Awful things are what happens
Awful things. Awful things are what happens. Join us for the fun!Popular sites for downloading applications spreads malware!Why We Hate Recommending S
Four in 10 Americans face regular online fraud attacks
Microsoft offers four primary tips to help protect users from identity theft:• Be selfish and defensive with personal information by not sharing sen
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
New Microsoft Windows Zero-Day Vulnerability - CVE-2014-4114On Tuesday, October 14, 2014, iSIGHT Partners - in close collaboration with Microsoft - a
The NSA Gets an OK for Telephony Metadata Collection Yet Again
As much as we’d like to forget about the National Security Agency (NSA) and its mass surveillance program, it seems that there is no distracting our
Yet another wave of digital destruction is coming
Malware fever keeps on raging, taking sophisticated forms to wreak havoc around the worldwide web. Even if your system is guarded thoroughly, you are
Internet Monitoring and Brand Protection
A review of the past 10 years in cyber security opened our eyes here at Massive. Reflecting on over 50 international security conventions, hundreds of
Computer Threat 3rd Quarter 2013 McAfee Report
McAfee Labs today published its quarterly report on the latest threat tendencies – review the details to get a generous portion of statistics and nu
NSA: The Future Of Cloud Computing In U.S.
NSA security breach has posed a great question mark on cloud security. Is it a real secure scenario at the data centers of just hype? Every techn
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
In June, President Obama said the NSA’s email collecting program “does not apply to U.S. citizens.”The newspaper The Washington Post reports to
New Intel Chips Contain Back-Door Processor
New Intel Chips Contain Back-Door Processor, Hackable Even When Computer is Turned Off According to unconfirmed reports, the Intel Core vPro proces
New Version of ESET Social Media Scanner
New Version of ESET Social Media Scanner in BETAESET®, the global leader in proactive digital protection with a record of 10 years consecutive VB100
Trend Micro warns of new spam campaign
Attackers sends out to users letters about voicemail in WhatsApp.Experts of Trend Micro encountered samples of spammed messages that were supposedly W
FBI Admits It Controlled Tor Servers
FBI Controlled Freedom Hosting Tor ServersThe FBI has admitted to taking control of Freedom Hosting servers on the anonymity network Tor right before
Latest Java update will block exploits
Latest Java update includes tool for blocking exploitsIn the latest Oracle's developers update Java SE Development Kit (JDK) version 7 has been added
Microsoft starts iPad buyback to boost Surface tablets sales
American multinational corporation Microsoft has launched a US marketing offer that will let people exchange 'gently used' iPads for Microsoft produc
Best Cell Phone Monitoring Software 2013
Cell phones make life more convenient. While cell phones are invaluable resources, they can sometimes be problematic. Cell phones for kids and o
Modern Internet security threats
Computers, laptops and even smartphones are constantly exposed to different malicious programs aimed at causing various damages to the system. Compu
Banking Trojans disguise attack targets in the Cloud
G Data found a new configuration of the banking Trojan ZeuSCloud-Technologies are popular and widely spread – whether for storage of data, rented co
VIPRE Antivirus is the best anti virus protection that doesn't slow down your PC
If you would like antivirus which scans effectively, just go for VIPRE Antivirus. This software is generated by GFI company. Its main work is to prote
18.5 million most popular websites contain malicious content
Securi company conducted a study according to which nearly 2% of world's most popular websites are malicious.Almost 2% of the most popular sites in th
PHP script supports four types of DDoS attack tactics
This script uses compromised servers and supports four types of DDoS attack tactics.Earlier this year, the organization US-CERT has released a notice
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7407 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5806 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16770 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9178 Views -
Awful things are what happens
Posted: 2015 January 16 | 6887 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10096 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10747 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10740 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11899 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9233 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6429 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7588 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 17316 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7947 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6590 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7311 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6378 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6435 Views