Threats and Breaches

Threats and Breaches

Svchost.exe *32 Miner Virus (100% CPU) – How to Remove It

Svchost.exe *32 Miner Virus (100% CPU) – How to Remove It

This article has been created in order to explain to you what is the svchost.exe *32 miner process and how to remove it from your computer completely. The svchost.exe *32 miner virus ...
WinstarNssmMiner Virus (Cryptocurrency Miner) — How To Remove it

WinstarNssmMiner Virus (Cryptocurrency Miner) — How To Remove it

This article has been created in order to explain what is the WinstarNssmMiner Trojan and how to remove this malware completely from your computer. The WinstarNssmMiner virus is a stealth Trojan that ...
CryptoShuffler Trojan (Cryptojacking Virus) — How to Remove it From Infected Computers

CryptoShuffler Trojan (Cryptojacking Virus) — How to Remove it From Infected Computers

This article has been created in order to explain what is the CryptoShuffler Trojan and how to remove this malware completely from your computer. The CryptoShuffler Trojan is a Cryptojacking virus that ...
10 Percent of iOS Apps Have a Data Compromising Vulnerability

10 Percent of iOS Apps Have a Data Compromising Vulnerability

A common programming error exposes almost 10 percent of iOS apps to attacks that can result in their data being wiped or malicious code being executed in their sandbox. The vulnerability was ...
Security Boulevard
ZipperDown Demo

ZipperDown Programming Vulnerability Could Let Hackers Execute Code in iOS Apps

A recently discovered vulnerability in iOS applications could allow hackers to execute code within affected apps, provided the device is connected to an attacker-controlled Wi-Fi network. The number of potentially vulnerable applications ...
Hackers Using Hard-to-Block DDoS Amplification Technique

Hackers Using Hard-to-Block DDoS Amplification Technique

Hackers have started to abuse routers and other internet-of-things devices that expose their UPnP interfaces to the internet to launch distributed denial-of-service (DDoS) attacks that are hard to block, even by DDoS ...
Security Boulevard
Rail Europe data breach lasted almost three months

Rail Europe data breach lasted almost three months

Travel website Rail Europe has informed customers that their lifelong dream to see the sights of Europe by train may have turned into a nightmare. Real Europe North America Inc (RENA) is ...
Chili’s hit by malware, payment card data stolen

Chili’s hit by malware, payment card data stolen

Chili’s customers may have fallen victim to a malware attack that affected a number of credit and debit cards used in several restaurants, confirmed parent company Brinker International on Saturday. The malware ...
Safeguard Email Compromised Attacks

Adobe Patches Zero-Day Vulnerability in Acrobat, Reader

Adobe Systems has released new security patches for critical vulnerabilities in its Acrobat and Reader products, including one zero-day vulnerability found in the wild. The updates fix 47 vulnerabilities, 24 of which ...
Security Boulevard
Loading...