27 C
Texas

CATEGORY

Security

How to Protect Your Information on Facebook

Facebook is the largest social networking site where millions of people collaborate with each other on a regular basis. However, Facebook is also a...

TrickBot Trojan is Upgrading

Banking is one of the most sensitive areas of security. It’s directly related to money transfer and requires the best protection available. TrickBot is...

Zenis Ransomware – Deletes Your Backup and Encrypts Files

Ransomware has been the hot topic of security world for quite a few months. This is a type of attack that encrypts a system’s...

New Android Malware – FakeBank (improved)

Malware is the worst types of programs that are used to spy on others’ systems via illegal access. As Android is the most popular...

Pwn2Own 2018 – The Hacking Contest

Hacking is an essential part of every day’s security. Don’t you believe it? Well, offense is the best defense. You have to know how...

AMD Chips – Busted with 13 Vulnerabilities!

AMD is one of the largest chipset production companies. In fact, AMD has all the right to compete with the giant chipset producer –...

Robots under Ransom – Threat of Future

Ransom is one of the worst types of security issues all over the world. Recently, we also have observed the biggest ransomware attacks in...

How to Mitigate DDoS from Memcached Servers

Recently, the frequency of DDoS has reached sky-high. Thanks to the availability of Memcached servers, attackers were able to launch DDoS of ~1 terabit/s!...

Pre-installed Trojan in Android Smartphones

Recently, Android security provider company Dr. Web reported that a good number of the Android phone in the market come up with a pre-installed...

Tesla Cloud Account Data Breached!

According to the security company RedLock, hackers hacked a Tesla account on AWS (Amazon Web Service) using an unsecured Kubernetes container management console. The...

Latest news