Betabot Trojan Phase II: Stealing credentials and transmitting ransomwares

If there is one thing that hackers and cyber criminals are good at, it’s coming up with new evil Betabot trojans. But can you really…

Rationalizing VM Security: Exploiting DRAMs

When it comes to securing Virtual Machines (VM Security), physical vulnerabilities in memory chips is the Achilles heel amongst all the potential weaknesses currently existing…

China Blamed for Cyber Attack on Bureau of Meteorology Super Computer

The Bureau of Meteorology, that owns one of Australia’s largest super computers, has experienced a major cyber-attack! The Bureau offers critical information to different agencies;…