Chrome becomes a bit less of a memory hog with version 45
Some new Flash refinements will make it use less battery power, too. While the Chrome browser is extremely popular, it has gained something of a reputation. What hippos are toRead More →
Some new Flash refinements will make it use less battery power, too. While the Chrome browser is extremely popular, it has gained something of a reputation. What hippos are toRead More →
We’re used to seeing malware that exploits unpatched vulnerabilities in software. But in a new twist attackers are bundling an old version of remote access package TeamViewer with their malwareRead More →
While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation algorithms by Ryan Castellucci. The backdoor is particularlyRead More →
Security experts constantly tell users not to reuse passwords on multiple accounts, but the message often falls on deaf ears. Now, officials at Mozilla are finding that advanced users don’t alwaysRead More →
G DATA security experts published their latest research in which they’ve analyzed top Chinese Android smartphone models and found that a large number of them ship with pre-installed malware andRead More →
Online daters risk being held to ransom in possible cyber attack on Match.com Match.com has suspended advertising on its UK site whilst investigating amalware issue that put singles looking for loveRead More →
During the course of our daily malware hunt, we came across a new mobile ransomware variant that leverages pornography to lure victims into downloading and installing it. We’d previously bloggedRead More →
Six weeks after hackers revealed vulnerabilities in a 2014 Jeep Cherokee that they could use to take over its transmission and brakes, Chrysler has pushed out its patch for thatRead More →
A new strain of Android ransomware disguised as a video player app uses a means of communication unseen in other similar malware. Most of the victims are in the UnitedRead More →
New variants of the notorious Carbanak Trojan have surfaced in Europe and the United States, and researchers say that the malware now has its own proprietary communications protocol and the samplesRead More →