IBM X-Force research team has discovered a new bank Trojan called IcedID. The article discusses its advanced features and methods of operation, including web in
Discover the security risks associated with MantisTek GK2 mechanical gaming keyboards that record user input and transmit it to a Chinese server. Learn how to p
Discover how iPhone apps can secretly take photos without user permission after being granted camera access. Learn about the potential risks and what developers
This article details the process of investigating a network fraud incident involving a friend and his舍友. Learn about the steps taken, including domain checks, s
This report from CNCERT analyzes the security defects in open-source software used by top foreign internet companies such as Google, Facebook, and Twitter. It c
Central Bank expert warns of significant risks posed by Fintech, particularly focusing on liquidity risk. The article discusses the potential impact of large Fi
Discover why Discord has become the most popular communication app among dark web criminals despite not supporting end-to-end encryption. Learn about the growin