Suspected North Korean hackers are sending phishing emails that link to a malicious application that runs on Macs built with ...
Security researchers spot new malware framework called Winos4.0 It is capable of monitoring the clipboard, gathering system ...
The malware is dispersed using torrent trackers and forums, where it is used as a tool to activate authentic versions of the ...
Impersonating legitimate software such as Foxit PDF Editor and AutoCAD, the SteelFox crimeware bundle steals user information.
Using the BYOVD technique for privilege escalation has been typical for nation-state actors and ransomware groups, and is rarely observed with info-stealers. Microsoft is the most BYOVD-affected ...
Avira offers fairly extensive protection against several digital threats and is available for Windows, Mac, Android, and iOS ...
An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM) repository in an attempt to infect the devices of developers who rely on code libraries ...
An updated Android trojan called FakeCall hijacks bank calls. Tech expert Kurt “CyberGuy" Knutsson says Android phone ...
Unblock websites, safeguard your online privacy, and more with 61% off a three-year subscription to Windscribe’s Pro plan.
Two suspects were arrested by Belgian police and servers shut down after a coordinated investigation of transnational malware ...
Equip your USB drive with these 10 essential free portable apps to tackle security, maintenance, and productivity on any computer in a flash!
We test AVG Internet Security for Mac and find it easy to use and effective at catching viral, phishing, and malware activity ...