Estimated reading time: 3 minutes
Even those with a passive interest in cybersecurity have a fair idea of how hackers can take control of a system. This is mostly done through malware – unsuspecting users somehow download or access a malicious file or a...Search Results
Estimated reading time: 6 minutes
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...