New Malware Pieces Run Completely on Graphics Card

New Malware Pieces Run Completely on Graphics Card

Proof-of-concept code is now publicly available

PacMan Ransomware Targets Danish Chiropractors via Well-Crafted Phishing

PacMan Ransomware Targets Danish Chiropractors via Well-Crafted Phishing

Legitimate Windows utilities prevented from running

New Configuration for Citadel Trojan Aims at Password Managers

New Configuration for Citadel Trojan Aims at Password Managers

Keylogging function is activated by specific processes

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

ScanBox targets a diverse set of organizations

Keylogger in Phishing Email Also Takes Screenshots

Keylogger in Phishing Email Also Takes Screenshots

Attacker receives pic of researcher catching malware traffic

Modular Malware for OS X Relies on Open-Source Keylogger Code

Modular Malware for OS X Relies on Open-Source Keylogger Code

Ventir malicious package is similar to Morcut/Crisis

Microsoft Likely to Remove Windows 10 User Tracking Tech, Expert Says

Microsoft Likely to Remove Windows 10 User Tracking Tech, Expert Says

Windows 10 Preview has tech to monitor user activities

Windows 10 Preview Allegedly Acting as a “Keylogger,” Keeping Track of Every Click

Windows 10 Preview Allegedly Acting as a “Keylogger,” Keeping Track of Every Click

The Privacy Statement for Windows 10 Preview reveals some untold aspects of the new OS testing version

  • iWorld
  • By Filip Truta
  • October 1st, 2014
Warning: Some iOS 8 Keyboards Are Keyloggers

Warning: Some iOS 8 Keyboards Are Keyloggers

You basically agree to send keystrokes to a server

Rogue Code Injected in Industrial Site for Reconnaissance Purposes

Rogue Code Injected in Industrial Site for Reconnaissance Purposes

Attackers possibly planning a watering hole attack

Bifrose Backdoor Variant Uses Tor, May Work Against It

Bifrose Backdoor Variant Uses Tor, May Work Against It

This Bifrose can do more than just record activity on the affected system

Keyloggers Installed at Hotel Business Centers, the U.S. Secret Service Warns

Keyloggers Installed at Hotel Business Centers, the U.S. Secret Service Warns

Advisory letter recommends several practices for safer public computers

Former Purdue University Student Sentenced to 90 Days in Prison for Changing Grades

Former Purdue University Student Sentenced to 90 Days in Prison for Changing Grades

The student who acted as his lookout got 18 months' probation

How to Spy on Your Own Linux OS with the Logkeys Keylogger

How to Spy on Your Own Linux OS with the Logkeys Keylogger

The application hasn't been updated in a while but it still works

11 California High School Students Expelled After Hacking Computers to Change Grades

11 California High School Students Expelled After Hacking Computers to Change Grades

No charges have been filed, but authorities are still investigating

Keyloggers Become Irrelevant with the SecurePro Keyboard

Keyloggers Become Irrelevant with the SecurePro Keyboard

Mac/PC-compatible peripheral takes a “billion-billion” years to crack

Two Former Purdue Students Admit Hacking Computers to Change Grades

Two Former Purdue Students Admit Hacking Computers to Change Grades

Both of the hackers will be sentenced in February 2014

 
Want more? Browse: