Security

Razy Trojan Altering the Browsing Experience to Steal Cryptocurrency

Razy is delivering fake search results, fraudulent ad banners, and swindling offers. The extension is monitoring the user browsing activity and hits...

The IoT Nightmare – Attackers Can Compromise Apps, Steal Credentials

Barracuda Labs runs remote IoT attack via web and mobile apps, with no product contact Vulnerabilities allow for credential theft, access to sensitive...

VeryMal Malvertising Campaign Can Bypass Scanners on Mac OS

A new malicious ad campaign has been discovered that is capable of triggering as many as 5 million times a day. The...

Ascension Database Misconfiguration Exposes 24 Million Financial and Banking Documents

A huge banking database of sensitive information was left wide open for anyone to access. The information contained in the documents makes...

Anatova is One of the Most Sophisticated Ransomwares Ever

Anatova comes with multi-layered cipher key encryption that makes one-step decryption impossible. The ransomware is also wiping its traces and keys from the...

Marvell Avastar Found To Contain Two Severe Vulnerabilities [Update]

Four memory corruption problems were found to plague many versions of the ThreadX firmware. One of them is especially easy to exploit,...

ATLAS Taken Down Twice; Due to Players Using Server Exploits

Massively multiplayer online game ATLAS suffered two separate server exploits last week that disrupted gameplay. The first incident occurred on January 17...

AIESEC Data Breach Exposes Information of 4 Million Applicants

Four million internship applicants see their sensitive personal information fly off to unknown destinations. AIESEC responds by saying “this was our mistake,...

Online Casino Gamblers Lose More Than Their Bets

Several online casinos that utilized a particular ElasticSearch database had their users' data open to access. The information that leaked includes real...

STOP Ransomware Finds New Infection Channels Through Software Cracks

A new variant of the STOP ransomware is out on the hunt for victims, hitting new distribution highs. The infections find their...

Recent Articles

10 Best Ultrawide Gaming Monitors in 2020

Ultrawide monitors are a relatively new trend in the world of computers, mainly because the technology required to make them feasible was not mature...

More Than 15 Billion Stolen Credentials Are Circulating Out There

Stolen credentials are sold by the billions today, as we have about 185 data breaches per day. Almost one-third of the stolen...

Here’s What We Know About Kilos, the Biggest Dark Web Market

One of the most infamous sites on the Dark Web was a search engine known as "Grams." Launched in 2014, Grams allowed users to search...

Zoom Announced the Launch of Its “Hardware as a Service” Program

Zoom calls companies to consider renting teleconferencing equipment from them and launches a new program. The hardware manufacturers that will support the...

The U.S. Copyright Office Says Pirates Shouldn’t Lose Their Internet Connection

Breaking the law is condemnable, but barring someone out of the internet world is unconstitutional. The U.S. Copyright Office is calling the...