Hackers are hiding virtual credit card skimmers in image file metadata
Hackers put Magecart JavaScript code into the EXIF metadata of image files, which is then loaded and executed by compromised […]
Hackers put Magecart JavaScript code into the EXIF metadata of image files, which is then loaded and executed by compromised […]
The Chrome extensions were mimicking cryptocurrency wallet apps like Ledger, MyEtherWallet, Trezor, Electrum, and others, but, in reality, they were […]
Researchers are warning that a hack of Linksys and D-Link routers is redirecting users to malicious sites posing as COVID-19 […]
Researchers have uncovered a mobile surveillance campaign that has used more than 30 malicious Android apps to spy on targets […]
The Information Commissioner’s Office (ICO) has fined DSG Retail Limited (DSG) £500,000 after a ‘point of sale’ computer system was […]
Google announced that it’s teaming up with three security companies to help identify malicious apps before they’re published on the […]
The musical ransomware, FTCode, plays German rock music whilst encrypting victims’ files. Researchers at AppRiver discovered FTCode within malicious email […]
For two years, a handful of websites have indiscriminately hacked thousands of iPhones. The rare and intricate chains of code […]
A new malware has been discovered that is able to record the screen of an infected machine and identify a […]
Last year, the arrival of the EU’s General Data Protection Regulation sent shockwaves through the world of data protection. Big […]
Dubbed GHIDRA, the tool will allow folks au fait with cyber security to pick apart binaries for Windows, macOS, Android and iOS, […]
While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry […]