Corona virus has now spread rapidly worldwide and recently declared by the World Health Organization as a global pandemic. Amidst the Global fear this virus has brought us, cybercriminals do not show signs of slowing down as they are continuously capitalizing on the said virus to spread different kinds of cyber-attacks. There is a newly...Continue Reading
Stemming from several reports from several security researchers, there’s a new cryptominer called The Bird Miner. It targets Apple Mac systems through an ‘Ableton Live 10’ torrent. The music production software costs several hundred US dollars, so many people are on the look for cracked versions that they can download without paying a dime. However,...Continue Reading
Security experts discovered two serious vulnerabilities in the iLnkP2P P2P system that ìs developed by Chinese firm Shenzhen Yunni Technology Company, Inc. The iLnkP2P system allows users to remotely connect to their IoT devices using a mobile phone or a PC. Potentially affected IoT devices include cameras and smart doorbells. The iLnkP2P is widely adopted...Continue Reading
Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...Continue Reading
Cyber Security Researchers at CTG disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. Some of the flaws could be exploited to execute arbitrary code, modify passwords, and change system settings. Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices,...Continue Reading
Ransomware and Cryptocurrency mining attacks have been very frequent since last year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature...Continue Reading
A high-severity malware has been found to Cisco’s enterprise-class Industrial Network Director that allows remote attackers to hijack this industrial network and allows attackers for arbitrary code execution as the root user. The Cisco Industrial Network Director (IND) is designed to help operations teams gain full visibility of network and automation devices in the context...Continue Reading
Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...Continue Reading
A hacker who runs a DDoS Service business from the Dark Web and across the criminal internet forums lately made the front page of the internet discussion through numerous tech-news site as he had published a list of IoT Telnet device credentials amounting to 515,000 devices that he had “cracked.” The list of exposed credentials...Continue Reading
Judge Mark Henry of Galveston County called on the county’s auditor and purchasing agent to resign, blaming them for the theft by cyber scammer of more than $500,000 from the county earlier this year. At a county commissioners meeting Monday, Henry said County Auditor Randall Rice and County Purchasing Agent Rufus Crowder should be held...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.