Please wait, you are being redirected to the web page requested.
If the page doesn´t load shortly, click here
A security researcher that goes by the name Chloe recently tested around 1,400 Tor exit nodes by setting up a Bitcoin-themed phishing site.
Cyber attackers and defenders are caught in a permanent to-and-fro dance, coming up with new solutions that break the last one created by their adversaries.
Dyre's primary goal is to harvest victims' online credentials, and it's capable of doing this by mounting Man-in-the-Browser attacks against the three most commonly used Windows browsers: Internet Explorer, Firefox, and Chrome.
Cybercriminals have, in the last nine months, increasingly returned to cost-effective macros to reach more targets and see a greater return on their financial investment.
A researcher shared his discovery of not one but fifteen flaws of varying severity in a number of font engines used by Microsoft's Windows, Adobe's Reader software, popular modern browsers, and so on.
Update you Flash Player if you don't want ransomware
Researcher tests Tor exit nodes, finds not all operators can be trusted
Energy security pros: More competent, or just naive?
Six key facts about malicious macros and the cybercrime economy
TLS security: What really matters and how to get there