Latest Articles in malware

Hackers Exploiting Critical Flaw in Microsoft Office to spread Malware; India at High Risk

The malware dubbed as “FreeMilk” is used by the hackers to infiltrate the computers using malicious codes and retrieve confidential information without even getting noticed

Read More

Google Fighting Biggest Ever Android Malware Outbreak - Or Are They?

Based on available data, there’s no indication that this specific malware propagates by itself or that it is particularly dangerous

Read More

Shadow Brokers Release Windows Malware that can Steal Keystrokes and Record Audio to its Paid Subscriber

Paid subscribers of Shadow Brokers’ monthly subscription can now gain complete access to your PC/laptop and steal your passwords and chats

Read More

Malware Found Embedded in Software Used by 100+ Banks Globally, including India

The malware allows an attacker to gain complete remote access to bank servers

Read More

Fortinet Report Reveals Majority of Threats Faced by Most Organizations are Opportunistic in Nature

Research Demonstrates Highly Automated Cyber Defenses are Critical to Mitigate Pervasive “Cybercrime-as-a-Service” Attacks

Read More

Can OpenDXL Contain the Spread of Today’s Security Threats in the Enterprise?

A new security fabric from McAfee might be able to provide the line of defence that CIOs and CISOs need to contain the spread of ransomware and malware

Read More

Maintaining Mobile App Security is Essential

Here are a few common-sense measures that everyone must deploy to limit exposure to app malware attacks.

Read More

Understanding criticality of ATM Malware post demonetization

Following several incidences of ATM scanning attacks, which are now fading away, a new form ATM attack has cropped up – Malware attacks.

Read More

Alarming increase in targeted attacks aimed at politically motivated sabotage and subversion

Annual threat report from Symantec details how simple tactics led to unprecedented outcomes

Read More

Amity Secures Its Campuses with New Cyber Alert System

The system enables them to collect attack data from its ATP sensors installed across 11 national and international Amity locations to create a security bulletin report of attack trends.

Read More