Hackers use Slack to hide malware communications
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
The decade-old Qbot financial malware has resurfaced with an improved version in a new attack that has infected thousands of systems so far.
This concise malware bestiary will help you get your malware terms right when you hang out with geeks - with basic advice for finding and removing malware when you've been hit
“Adversaries are now focusing on new targets to catch less security-mature companies and countries,” says Mark Thomas, group CTO at Dimension Data.
Scammers claim to have video footage of people in compromising positions and they are using it to blackmail them.
The temptation to just pay the ransom will be strong, but just because you live up to your end of the bargain doesn’t mean the cyberthieves will.
A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint.
Using EclecticIQ Platform, members can share information about malware and other online threats among themselves and with the wider cybersecurity community.
A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
A newly discovered fake Pokemon Go game will actually lock your phone and then secretly run in the background, clicking on porn ads.
Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash.
Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play.
Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.
The Petya ransomware now bundles a second file-encrypting program for cases where it cannot replace a computer's master boot record to encrypt its file table.
Two vulnerabilities recently patched in 7-Zip could put many software products and devices who bundle the open-source file archiving library at risk of compromise.