It's now evident that the CCleaner malware attack was a targeted operation rather than being a brute force one. New clue suggests that the attackers targeted 18 tech companies for possible IP theft.
A recent study by security firm McAfee regarding celebrities that generate the most dangerous web results reveal Avril Lavigne at the top of the list, which is reportedly caused by free mp3 searches.
A two-stage backdoor in digitally signed binaries of 32-bit CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 caused the sending of "non-sensitive data" to a server in the US. The issue has been fixed.
A new malware that attacks devices via Bluetooth has been discovered by a security firm. Without the need to pair, it can spread itself onto other devices without the victim's knowledge.
Security firm AppRiver has recently discovered a spike in the email distribution of the infamous Locky ransomware, sending it out to as much as 23 million people in just over 24 hours.
As a measure to protect its customers from potential malware attacks, Google has introduced Play Protect, announcing that future 'certified' devices will carry the logo on their retail packaging.
Sources have revealed that hackers are using emails that promise fake Game of Thrones spoilers to lure viewers into downloading malware which installs a remote access Trojan on their systems.
A ransomware development kit from China allows anyone interested to customize their own ransomware for Android. Coding skills are not necessary, only requiring the user to fill out a form.
A security researcher recently discovered a new malware attack on Facebook that uses social engineering. It can even detect a user's system settings so they can be targeted with appropriate adware.
A vulnerability in Windows OLE is being exploited by cybercriminals. The attack makes use of an innocuous-looking PowerPoint attachment, which in turn downloads malware to spy on users.
An adware called Mughthesec has been recently discovered. It masquerades as an installer for Flash Player, which comes bundled with three other programs. These will then modify browser settings.
A new phishing campaign which utilizes spam emails was recently discovered by Microsoft. These will redirect to websites that will try to extort money from victims through fake tech support.
The Cerber ransomware has gained an ability to steal Bitcoin wallets and browser passwords from host computers, according to a security report. This is done aside from the usual encryption process.
Marcus Hutchins, the security researcher who first discovered the WannaCry kill switch, has been arrested by the FBI in Las Vegas over his alleged involvement in the creation of another malware.
An Android Trojan was recently found to be updated with a keylogger and capability to take advantage of the OS's accessibility feature, which can be used to display phishing links and steal data.
Researchers have discovered that a few smartphones made by Chinese OEMs are being shipped with a tampered Android core library that features one of the most sophisticated malware strains for Android.
Android security researchers have recently found a new spyware called Lipizzan that made its way into the Google Play Store. The program could silently gather sensitive data about the victim.
According to a recent study by Google, Chainanalysis, and two universities, ransomware victims have paid out over $25 million dollars over the past two years in hopes of getting their files decrypted.
A piece of malware for macOS, initially discovered back in January, has been found with a new variant, which discreetly spies on host computers, steals sensitive files, and run background processes.
Hacking groups have caused irreparable damage over the years, destroying careers and causing political uncertainty, and Microsoft has taken the fight to them using the criminal's own tactics.
A new vulnerability that impacts Linux systems has been discovered by a researcher. The vulnerability, which affects the GNOME Files file manager, has already been patched by the Debian Project.
A new form of Android malware has recently been discovered by Trend Micro, which can not only steal sensitive data from a device, but can also record audio and video without the victim's knowledge.
With ransomware in the news almost every week, a new threat called LeakerLocker has emerged that affects Android users by extorting money from them, in exchange for not spreading private information.
From OnePlus jelly and OneDrive woes, to Nokia cameras, Bing's new look, a phone with no battery, uTorrent games, and Microsoft's Modern mess, it's our handy walkthrough of the week's top tech news.
Hackers that appear to be state-sponsored have been targeting the networks of nuclear power companies for the last two months. Officials say there is no indication of a threat to public safety.
A recent report by the AV-Test organisation showed some interesting metrics for the malware and virus market overall in 2016. Linux and macOS showed the largest gains in new attacks.
Wikileaks has exposed a targeted attack against systems running Linux with traffic re-routing malware known as 'OutlawCountry', after a massive data dump by the controversial online leaker.
Following the recent Petya ransomware attack, Microsoft has detailed the extent and functioning of the outbreak, recovery options for infected machines, and the multi-layered defense in Windows 10.
A recent report by a security analysis center claimed that 250 million PCs had been infected by Fireball malware, including 20% of corporate networks - but Microsoft's data suggests otherwise.
Google has introduced improvements to its spam filters in Gmail. It will now take time to analyze emails that are suspected to be phishing users. It will also warn Android users of sketchy websites.
Already plagued by security issues, Android has received another dose of malware through some apps in the Google Play Store. Known as 'Judy', it was discovered by security specialists Check Point.
The Action Fraud centre of the UK is now warning people about tech support scams saying their machine is infected by WannaCry, and then demanding a hefty amount of money as payment.
A flaw in the way WannaCry operates has allowed a couple of researchers to create decryptors for those affected by the ransomware. That said, these solutions only work for some versions of Windows.
A newly-discovered ransomware variant was seen using old techniques of victimizing users. However, it demands a steep amount to unlock files, exploiting the rapid rise of the value of Bitcoin today.
According to researchers at Check Point, nearly two million devices may now be infected with malware made available via the Google Play Store, the first of which was uploaded in November 2016.
The ever-growing assortment of ransomware-as-a-service threats has gotten a new member in the shape of Hidden Tear-based "Karmen". It can be purchased on the black market for $175.
Though the hotel operator originally said just a dozen locations had been affected, new data has been released, which shows over 1000 hotels in the US alone were overrun with malware.
Security researchers over at McAfee have found that attackers are exploiting an unpatched vulnerability within Microsoft Office, which allows for full control to be taken of the victim's PC.
Wikileaks has released more Vault7 data, which indicates that the CIA used a framework called "Marble" to mask the source of their malware in order to evade detection by forensic investigators.
It looks like a new hoax is making the rounds with the promise of a download for a Nintendo Switch emulator. The new scam requires users to download the software and unlock it via a survey.