Credit card skimmers explained: How they work and how to avoid them

What is a credit card skimmer? In the security industry, a skimmer has traditionally referred to…

Sextortion group behind bomb threat spam campaign

The emailed bomb threats, which demanded up to $20,000 bitcoin payments from banks, courthouses, schools, universities,…

What is a keylogger? How attackers can monitor everything you type

Keylogger definition Keyloggers are a type of monitoring software designed to record keystrokes made by a…

What is cryptojacking? How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by…

Who Is watching the watchers?

Much like any revolution, this one started with a whisper and not a bang. In 2017,…

Why it’s harder for threats to hide behavior on a corporate network

Threats are becoming more sophisticated. Threat actors are determined to find ways to disguise malicious activity…

Hackers lure victims with fake cryptocurrency SpriteCoin

For folks in a mad rush to finally start cashing in on cryptocurrencies, beware SpriteCoin! The…

Are bad analogies killing your security training program?

What we have here is a failure to communicate. Security training and awareness campaigns too often…

Dark Caracal: Hacking group targets Android smartphones

Spyware traced to a building belonging to Lebanese intelligence has managed to steal “hundreds of gigabytes”…

Skygofree: Powerful Android spyware with advanced surveillance tools

Researchers at Kaspersky uncovered “one of the most powerful” Android spyware tools that it has ever…

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Well, this is bad…very bad. Mirai malware and its many variants which have targeted CPU architectures…