Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some …
Coinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via Bitcoin Phishing Campaign
Ukraine Cyberpolice and Researchers from Cisco Talos uncovered a Bitcoin Phishing campaign that uses Google AdWords to find their victim. …
Biggest Crypto-Mining Campaign Ever – Hackers Mine $3 Million Worth of Monero Crypto-currency
Security researchers from Checkpoint discovered a largest Monero mining activity that uses XMRig miner on various versions of Windows machines. …
Ethereum vs Bitcoin: Can the Ethereum Take the Throne?
Bitcoin has always been the leading cryptocurrency running the show for quite some time now until in the year 2014 …
Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad
A single character can crash iPhone if it simply pasted in the text field, received as a message via apps …
DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits
IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete …
Hackers Using Macro-Less Approach to Steal Victims Password Through Office Documents
Hackers use macros in Microsoft Office documents to distribute malicious scripts and it will be executed once the user opens …
North Korean Hacking Group “Lazarus” Targeting Banks & Bitcoin Users Via Sophisticated Malware
A New Malware campaign dubbed HaoBao distributing by North Korean Hacking Group “Lazarus” that specifically targets cryptocurrency and financial organizations via …
Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals
Endpoint Security & Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and …
AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits
A Newly discovered Android Remote Access Trojan called AndroRAT targeting unpatched Android Devices that exploit the publicly disclosed critical privilege escalation …