- The 4 true stories show how scary identity theft can be

in fact, being a victim of identity theft can be more frightening than many people imagine, you may even lose your identity or commit murder ...
- Masslogger - malicious code possesses the ability to steal all the login information of Chrome, Edge Outlook of the target

masslogger - a notorious trojan that specializes in stealing credentials targeting windows systems that officially have a dangerous 're-export'.
- Computers can be controlled by hackers because of YM errors

buffer overflows in two activex web components of the online messaging tool can provide an opportunity for hackers to install viruses, trojans to steal information or install backdoors to control a victim's computer.
- Trojans steal YM accounts to scam in Vietnam

with stolen yahoo messenger accounts, crooks chat with victims' friends, exploit information and buy a phone recharge card. at the same time, they spread the website link containing malicious code to continue the crime.
- Malware can steal Facebook, Twitter and Gmail accounts

researchers have discovered a new and complex malware variant, based on the famous zeus bank trojan but not just stealing bank accounts.
- Prevent attacks to steal your information

never reveal confidential information to people unless you are sure that they are entitled to request and have access to that information.
- Introduction to viruses, worms, and Trojans

viruses, worms, and trojans are dangerous programs that can destroy your computer and information on your computer, slow down the internet, and use your computer to distribute them themselves.
- Detected 4 banking trojans in 11 apps on Google Play Store

banking trojans are designed to steal banking credentials and other sensitive data.
- 23 malicious apps that steal Facebook and Instagram accounts and blackmail users, need to be removed immediately

zimperium security experts recently discovered a series of malicious applications that track android smartphone users to steal facebook, instagram, ... even blackmail device owners.
- Detecting APT attack campaign on important national infrastructure on Tet holiday

the main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.