Today we have the most recent list of malicious applications that have been detected by various security researchers and that aim to steal you personally ...
Researchers have publicly revealed a zero-day vulnerability in Microsoft Office that can be exploited using malicious Word documents resulting in malicious code being executed in ...
More than 50 domains-traps were used to spread the Predator monitoring software on the Smartphones of unsuspecting visitors New data for companies that connect the Greek public ...
Check Point Research, the research division of Check Point Software Technologies Ltd., published the Global Threat Index for April 2022. The researchers ...
It is considered worrying by many that a mobile platform like Android becomes an easy target for hackers who add malicious applications to the Play Store. Only last year, ...
The Hellenic Police is ringing the alarm bell for the citizens, for e-mails with the Greek Police as the alleged sender. This is an e-mail sent as a group by fraudsters and ...
The hacking team LAPSUS $ has managed to breach data from Nvidia, Samsung, Okta and Microsoft, however security researchers were surprised to discover that ...