Hamas honey traps Israeli soldiers with fake dating apps, succeeds getting negotiable intel
Palestinian Sunni-Islamist fundamentalist organization Hamas has been accused by the Israel army’s intelligence directorate for building fake dating and FIFA World Cup 2018 applications...
Cryptojacking skyrockets to top of attacker toolkit: Symantec
Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and...
Chinese hackers targeting WhatsApp, Indian Army warns users
The Indian Army has issued a warning to users of social messenger application, WhatsApp, alleging that Chinese hackers are targeting them to extract personal...
Kotlin-developed Malware Doing Rounds in Google Play Store
A malware developed using the Kotlin programming language is the new cause of concern for Google Play Store. It was recently found that Kotlin...
Cryptocurrency mining presents new threat to business: Check Point
GLOBE NEWSWIRE: According to the latest Global Threat Impact Index by Check Point Software Technologies, cryptocurrency mining was an increasingly prevalent form of malware...
8.2 billion devices worldwide at risk of remote attacks
Nearly 8.2 billion devices are at risk, globally, from remote attack vectors like device take over and man-in-the-middle (MITM), et al. According to researchers...
Malware threats to Apple iOS triple, study says
The number of malicious apps dedicated to attacking the Apple iOS — which is the system for devices such as the iPad, iPhone, and...
Israel Aerospace invests in Dutch, Hungarian cyber firms
In a bid to expand its cybersecurity reach, state-owned Israel Aerospace Industries Inc. (IAI) is investing in two cybersecurity companies – Inpedio BV in...
Invisible ‘cloak and’ a bloody ‘dagger’
Researchers at Georgia Institute of Technology have discovered a new class of android vulnerability. Dubbed as ‘Cloak and dagger’, the new vulnerability affects android...