The threat assessment stats of this month reads a comparatively high number of Malware URLs making it appearance on the web. These websites attempt to install malware onto your device and malware can be anything that will upset the working of yo... Read more
Week 6, saw the huge activity of malware campaigns delivering Crypto-Currency Miners, Banking Trojans, and Ransomware. Ransomware Attacks have been on the rise in past week, however, the long weekend seems to have an adverse effect. However, the... Read more
1: Source Code for iPhone Leaked on Github An Apple source code for a core component of iPhone’s operating system has allegedly been leaked on GitHub. This could allow hackers and researchers find presently unseen zero-day vulnerabilities... Read more
For past few days, a Hacker Group known as Group123, has been targeting Windows users with a Zero-Day exploit which affected Adobe Flash Player. In this attack, the malicious Flash Content is embedded inside Microwost Word Documents and is deliv... Read more
Just think of a situation when your system is infected by malware and you are unable to retrieve your data which does not have any backup anywhere. Do you afford to make such a huge loss by losing your valuable data by any unknown malware? eScan... Read more