CookieMiner malware targets Macs, steals passwords and SMS messages, mines for cryptocurrency

CookieMiner malware targets Macs, steals passwords and SMS messages, mines for cryptocurrency

Mac users can't ignore the need to protect their computers from malware with up-to-date anti-virus software and other security tools. The post CookieMiner malware targets Macs, steals passwords and SMS messages, mines ...

Misuse of WordPress update_option() function Leads to Website Infections

In the past four months, Sucuri has seen an increase in the number of plugins affected by the misuse of WordPress’ update_option() function. This function is used to update a named option/value ...
Spam Campaign Targeting German Users with Ordinypt Malware

Spam Campaign Targeting German Users with Ordinypt Malware

A new spam campaign is attempting to infect German-speaking users with samples of the destructive Ordinypt malware family. According to Bleeping Computer, the campaign sent spam emails masquerading as a job application ...

HP Labs Bristol: Why HP Leads On PC Security

I spent much of this week at HP’s Labs in Bristol England and this site, focused on security, is largely why the firm currently has the strongest security on their business class ...
Ellie Coverdale

Expert Opinion on Avoiding Common Cloud Protection Pitfalls

The post Expert Opinion on Avoiding Common Cloud Protection Pitfalls appeared first on CCSI ...
Simjacker

Simjacker: Silly Name, Scary Game

Researchers have found a nasty new flaw in 1B+ mobile-phone SIM cards ...
Security Boulevard
Yonathan Klijnsma, RiskIQ

How To Avoid Online Card-Skimming (Interview with Yonathan Klijnsma, RiskIQ)

| | browser, Finance, Malware, security
Hear how consumers can avoid online payment card-skimming (Magecart), in this interview with Yonathan Klijnsma of RiskIQ.The post How To Avoid Online Card-Skimming (Interview with Yonathan Klijnsma, RiskIQ) appeared first on Defending ...

Malware: What is spyware?

| | Malware Analysis
Introduction Many things in life come with their downsides, and unfortunately, the internet is one of them. Spyware is an unavoidable (without proper measures) thorn for those traversing the web and... Go ...
3 Cyber Security Tips for Small Business Owners

3 Cyber Security Tips for Small Business Owners

| | Malware, security, technology, two-factor
How to keep your small business secure from cyber attacks? With the following three simple measures, you can quickly improve the risk profile of your company. The post 3 Cyber Security Tips ...

Malware: What are Trojans?

| | Malware Analysis
Introduction The term “Trojan horse” is normally associated with the ancient Greek story of “The Iliad,” so why is there a type of malware called a Trojan horse? This is done on ...
Loading...