Coronavirus tracking app for Android is a ransomware in camouflage

5 years ago

An android application which facilitates the coronavirus infection tacker appears to be a ransomware in disguise, as it locks the…

Top 7 software vendors facilitating ‘Work from Home’ during COVID-19 pandemic

5 years ago

Considering the COVID-19 situation, software manufacturers have come up with free remote working software to facilitate the productivity and security…

Coronavirus ransomware encrypts devices to secretly allow Kpot steal credentials

5 years ago

A new ransomware variant called 'Coronavirus' is distributed through a bogus website Wisecleaner.best , pretending as if it is recommending…

Microsoft releases fix for the critical SMBv3 vulnerability- Patch now

5 years ago

Microsoft has released a patch just two days after the Patch Tuesday for the SMBv3 vulnerability CVE-2020-0796.

Microsoft Patch Tuesday March 2020 release patches for 117 vulnerabilities

5 years ago

Microsoft has released its patches for the March Patch Tuesday which includes patches for an alarming count of 117 vulnerabilities,…

What is Blockchain Technology?

5 years ago

The process of collecting and storing data in a diversified way with a cluster of computers without any authority over…

Coronavirus themed cyberattacks continues to evolve: Malware and Booby-trapped URLs

5 years ago

Security professionals have identified substantial amount of new threats like booby-trapped URLs, coronavirus themed malware, and credential stuffing manoeuvres.

Remote code execution in PPP Daemon (CVE-2020-8597) could become the gateway for attackers

5 years ago

Remote code execution vulnerability identified in the PPP daemon (pppd) software that comes in Linux operating systems and in other…

American enterprises are becoming victim to PwndLocker ransomware

5 years ago

Cities and enterprises in the United States are falling to PwndLocker ransomware which is asking for ransoms around $650,000. This…

Surfing attack manipulates voice assistant devices to extract information

5 years ago

Ultrasonic waves can be deployed to manipulate voice assistants to interact with the attackers fetch sensitive data, make fraudulent calls,…