Remove Matrix Ransomware and Restore .EMAN Files

This article will aid you remove Matrix Ransomware effectively. Follow the removal instructions at the end. The .EMAN Matrix Ransomware is the newest strain associated with the Matrix family of malware. Like previous versions it has an extensive list o… Continue reading Remove Matrix Ransomware and Restore .EMAN Files

CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

A new Telegram bug has been recently discovered which leaks the public IP addresses of the callers. It appears that the reason for this is a default configurations option which has been found to cause this behavior. CVE-2018-17780: Serious Telegram…R… Continue reading CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

Hackers Exploit IoT Medical Devices via Unusual Methods

The IoT medical devices have long been one of the most popular targets by computer hackers. In the past several years experts have warned both vendors and users about the vulnerabilities associated with it. Iot Medical Devices Continue to Be…Read mor… Continue reading Hackers Exploit IoT Medical Devices via Unusual Methods

The Torii Botnet Is A Sophisticated Hacking Weapon

The Torii botnet has been discovered in an ongoing target campaign uncovering some of its distinctive features. An analysis has been made revealing that it behaves in a very different way to other popular botnets. Torii Botnet Relies on Distinctive…R… Continue reading The Torii Botnet Is A Sophisticated Hacking Weapon

Lojax Is the First UEFI Rootkit Used in a Cyberattack

A team of security analysts discovered a dangerous new weapon used by hackers — the Lojax UEFI rootkit which apparently is the first of it kind to be used against users. The collected information about it shows that it is…Read more
The post Loj… Continue reading Lojax Is the First UEFI Rootkit Used in a Cyberattack

The VPNFILTER Trojan Has Been Updated With New Advanced Features

The VPNFILFER Trojan has been updated by the developers behind it with new modules that make it an even more dangerous threat. The detailed security analysis shows that in the hands of experienced hackers it can cause significant damage to…Read more
Continue reading The VPNFILTER Trojan Has Been Updated With New Advanced Features

Czech Android Trojan Impersonates QRecorder App

A new Czech Android Trojan has been detected which has been found to impersonate the QRecorder app. A statement from the police shows that the hacker or group behind it has already stolen over 78 000 Euro from victim accounts….Read more
The post Czec… Continue reading Czech Android Trojan Impersonates QRecorder App

All Wi-Fi Routers Found to Be Affected by Unfixable Vulnerability

Modern Wi-Fi routers have been found to be vulnerable to a dangerous vulnerability due to a technical design issue. A research team uncovered that the problem lies within the specifications of the network protocols and until changes into them are…Rea… Continue reading All Wi-Fi Routers Found to Be Affected by Unfixable Vulnerability

Hide and Seek Iot Botnet Now Set Against Android Devices

The Hide and Seek IoT botnet has recently been updated by its creators to now target Android devices as well. The security analysis reveals that the newly released is even more dangerous than before. Our article sums up the changes…Read more
The post… Continue reading Hide and Seek Iot Botnet Now Set Against Android Devices

Mobile Sites Can Be Abused to Leak Sensitive Sensors Data

A team of security researchers has uncovered that mobile sites can be abused to leak sensitive sensors data. The report called “The Web’s Sixth Sense” reveals the privacy implications and how exactly this can be used by malicious user… Continue reading Mobile Sites Can Be Abused to Leak Sensitive Sensors Data