It would be great if the process of securing a Windows 10 device can be reduced to a simple checklist. But the process of securing is much more complicated than that. The initial setup simply establishes a security baseline. When this configuration is complete, security needs continued vigilance and ongoing effort. A big part of…
Experts found the first malware that uses logical bug in Microsoft Office’s online video embedding feature to steal user data.
Trickbot’s new module steals passwords from several applications and browsers.
TSMC — one of the world’s largest makers of semiconductors and processors, which cooperates with AMD, Apple, Nvidia and Qualcomm was forced to suspend production processes due to the attack of WannaCry.
Cyber-criminals used the fake website of the German Federal Office for Information Security (BSI) to distribute Smoke Loader malware disguised as security patches for Meltdown and Specter.
The service is meant to protect against phishing attacks and malware from links in emails was used to spread the malicious Emotet.
A number of Russian media and state institutions of Ukraine were attacked by the new ransomware Bad Rabbit.
Experts have discovered a new way to bypass the protection against Rowhammer attacks, aimed at DRAM-memory.
Hackers who compromised the popular app CCleaner also tried to attack top technology companies: Cisco, HTC, Samsung, Sony, Intel, Epson, DLink, Oracle (Dyn), Microsoft, Google (Gmail), etc.
CCleaner download server was compromised to distribute malware.