Blog Posts Tagged with "malware "

Fa42af438e58b799189dd26386f5870f

Crypto-Mining Malware Attacks on iPhones Up 400%: Report

October 16, 2018 Added by:Ionut Arghire

Crypto-mining malware attacks against iPhones went up 400% in the last two weeks of September, security firm Check Point notes in a new report.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Trojanized Extension Uploaded to Google’s Chrome Store

September 07, 2018 Added by:Ionut Arghire

A trojanized version of the MEGA extension was uploaded to the Google Chrome webstore and automatically pushed to users via the autoupdate mechanism.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

From Production Slumps to Industrial Espionage: Why the Manufacturing Sector Must Be Better Prepared for Cyber Attacks

July 12, 2016 Added by:Mirko Brandner

In a connected world, where digitization progresses rapidly and finds its way into our factories, we are inevitably faced with an ever-increasing level of vulnerabilities that lead to security breaches.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

766e428d1e232bbdd58664b41346196c

Poisoning the Well: Why Malvertising is an Enterprise Security Problem

September 18, 2014 Added by:Elias Manousos

While customers won’t know or care which ad network delivered a malicious ad, they will blame the organization that owns the website or placed the ad that attacked them.

Comments  (2)