Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…More information
- Orfox app brings Tor’s security slider to Android
- WordPress Third Party Vulnerability – Deans FCKEditor with PWWANGS Code for WordPress(version 1.0.0)
- Privacy Activists in EU File Complaints Over iPhone Tracking
- Vulnerability in Mobile Networks Allows Easy Phone Tracking
- Hackers Linked to Luminosity RAT Targeted by Law Enforcement
- Microsoft Windows Kernel CVE-2018-0897 Local Information Disclosure Vulnerability
- Industry group formed to guide U.S. payment card upgrade
- FBI dispute with DNC over hacked servers may fuel doubt on Russia role
- Soon…
- Fortinet Acquires SASE Cloud Provider OPAQ Networks