Content Security

Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim’s PC. Git is version control system used for source code management in software development. According to a advisory

A recent spate of attacks using phishing, social engineering, exploits, and obfuscation are being used to spread a Quant Loader trojan capable of distributing ransomware and password stealers. Researchers at Barracuda last month began spotting malicious zipped Microsoft internet shortcut

MOST OF THE traffic on the web is encrypted. And more websites are adopting basic encryption measures every day. That means that, in theory, eavesdroppers have a hard time seeing whom you’re writing to on Gmail or what you’re looking

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails sent by hackers — and fewer than one-in-10 switch it on, according to a new survey. The survey, carried out

Google has implemented new protections that should considerably reduce the risk of potentially malicious apps gaining control of users’ Google account. There can be no doubt that the added security is a direct consequence of the massive phishing attack in

Researchers say a cybercrime group has been earning as much as $3 million to $5 million daily by generating up to 300 million fraudulent video-ad impressions per day. The group behind the ad fraud has created a complex bot farm

KickassTorrents is back from the dead! Back in July, the world’s largest and most notorious BitTorrent distribution site KickassTorrents (KAT) with millions of unique daily visitors was shut down by the U.S. authorities following the arrest of its alleged owner

The use of ransomware has been on the rise in recent times. Earlier this year, a hospital in Hollywood paid $17,000 in Bitcoin to hackers who’d encrypted its files so they’d unlock them; a Canadian university paid $20,000 to attackers