Written By Shane Schick

What Adobe’s Decision to Phase Out Flash Player Means for Online Security

Adobe announced that it will stop supporting its Flash Player by 2020, but the company pledged to continue offering security patches for the next few years

Splash Screens Elicit Scares, According to New Ransomware Study

A new ransomware study found that splash screens are being used to manipulate users through social engineering and scare tactics.

More Than 500,000 Systems Infected by Stantinko Malware Since 2012

Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.

Google Adds Verification Screens for Plugins Following Phishing Attacks

Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.

GhostCtrl Android RAT Demonstrates Spooky Range of Capabilities

Security researchers recently uncovered a scary version of GhostCtrl, an Android RAT with advanced capabilities that can be very difficult to detect.

New Malware Gets Stronger by Using Real Apps in Banking Attacks

New malware is infiltrating bona fide apps, making banking Trojans harder to detect. Fortunately, it can be shut down if it is detected in time.

Black Hat Attendees Predict Cyberattack on US Infrastructure Within Two Years

Security experts expect U.S. infrastructure to suffer a major cyberattack in the next two years, according a survey of recent Black Hat attendees.

Cryptocurrency Attacks Escalate as Fraudsters Strike Classic Ether Wallet and Bithumb

Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.

US Firms Have Less Than a Year to Comply With the GDPR

U.S. companies that handle data belonging to customers living in the European Union may not realize that they are subject to the GDPR.

GhostHook Attack Reveals Kernel-Level Threat in 64-Bit Windows Systems

Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.