Malware and Vulnerabilities

Hackers can turn web-connected car washes into horrible death traps

Hackers can turn web-connected car washes into horrible death traps

Android Malware: Apps In Google Play Store Discovered Stealing Texts

Android Malware: Apps In Google Play Store Discovered Stealing Texts

ICS Networks Not Immune To Insider Threats

ICS Networks Not Immune To Insider Threats

Vulnerable Radiation Monitoring Devices Won’t Be Patched

Vulnerable Radiation Monitoring Devices Won’t Be Patched

Hacker Says He Broke Through Samsung's Secure Smartphone Platform

Hacker Says He Broke Through Samsung's Secure Smartphone Platform

An ode to Flash: Everyone's favorite malware vector

An ode to Flash: Everyone's favorite malware vector

New Version of “Trickbot” Adds Worm Propagation Module

New Version of “Trickbot” Adds Worm Propagation Module

Defending Against the 4 Stages of a Ransomware Attack (Industry Perspective)

Defending Against the 4 Stages of a Ransomware Attack (Industry Perspective)

The state of ransomware among SMBs

The state of ransomware among SMBs

Malware sucks: crappy code makes it easy to hack hackers

Malware sucks: crappy code makes it easy to hack hackers

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

Researcher Reveals BIOS Firmware Implementation Flaws at Black Hat

Researcher Reveals BIOS Firmware Implementation Flaws at Black Hat

Creators Of SambaCry Linux Malware Also Have A Windows Backdoor Program

Creators Of SambaCry Linux Malware Also Have A Windows Backdoor Program

Critical Vulnerabilities Found in Nuke Plant Radiation Monitors

Critical Vulnerabilities Found in Nuke Plant Radiation Monitors

Why ransomware costs small businesses big money

Why ransomware costs small businesses big money

Unpatched Cisco Autonomic Networking Flaws Disclosed at Black Hat

Unpatched Cisco Autonomic Networking Flaws Disclosed at Black Hat

Check out the latest updates on internet malware and vulnerabilities.

This category provides expertly curated news on the malwares & vulnerabilities that are discovered daily by the expert teams across the globe. It covers all dimensions of the malware and vulnerabilities that any security team should be aware off. The software vulnerabilities, network vulnerability, vulnerable websites, traditional and advanced persistent threats, and malware virus including ransomware and hybrid Trojans that can even bring down advanced malware protection systems put in place are covered under this category. The latest information and updates on the malware and vulnerabilities discovered are indispensable to any security strategy. A timely action that removes any backdoors, zero day vulnerabilities or any other loopholes before an attack is carried out by the hackers is of utmost importance to any organizational security. Given the changing nature of attacks, the news on malware also helps the security professionals to look out for attack patterns that are oblivious to the normal eye.