Blog

Hackers Stole $15Million from Cosmos Bank

Hackers Stole $13.4 million from Cosmos Bank

Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation revealed...
Continue Reading
tech support scam

Mouse Cursor Hijacker: The New Scam

Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to be...
Continue Reading
Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite hack leads to children’s personal data being shared on dark web as scammers rack up huge in-play charges. For a measly £2.05 each, user logins and passwords of gamers are currently being sold on the lucrative online black market through this Fortnite hack. Fortnite is a game of survival wherein players can create a superhero...
Continue Reading
Twitter Account Hacking: How to Prevent Them

Twitter account hacking and how to protect yourself

Have you ever wondered if your Twitter account has been compromised? Twitter now has a feature that lets you find out. After Google and Facebook’s initiatives regarding Data Privacy, Twitter now tracks all devices logged into your Twitter account. This additional security feature for Twitter users – dubbed Apps and Sessions – allows you to see...
Continue Reading
Navigation Hacking: A Rising Threat in Modern Technology

Navigation Hacking: A Rising Threat in Modern Technology

With today’s modern technology, long drives are a thing of the past. Traveling and navigating is as easy as typing the location into your mobile device and voila! You now have a clear path towards your destination. It’s all thanks to the good ol’ GPS (Global Positioning System). As long as you have your smartphone with...
Continue Reading
Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and brand...
Continue Reading
New Way to Crack WiFi Passwords Revealed

New Way to Crack WiFi Passwords Revealed

Hashcat Developers have just discovered a new method to obtain a network’s Wi-Fi Protected Access (WPA) or Wi-Fi Protected Access II (WPA2) password. The Lead Developer of Hashcat, Jen “Atom” Steube revealed that the new attack method was discovered by accident during an analysis of the recently launched WPA3 security standard. According to Steube – “The...
Continue Reading
URL Spoofing on Safari Browsers

URL Spoofing on Safari Browsers

An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched,...
Continue Reading
More victims for Magecart Hack Group

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify platform....
Continue Reading
Australia Deemed One of the Most Vulnerable to Cyber Attack

Australia Deemed One of the Most Vulnerable to Cyber Attack

Australia is among a number of countries in the world that is most susceptible to a cyberattack. According to a 2017 data from the Rapid7 National Exposure Index, Australia was ranked ninth (9th) among the most susceptible to cyber-attacks. Dr Maria Milosavljevic, CISO (Chief Information Security Officer) for the Department of Finance, Services and Innovation told...
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion electronic...
Continue Reading
Apple Removed Cyber Security Vendor’s Apps for Amassing User Data on MacOS

Apple Removed Cyber Security Vendor’s Apps for Amassing User Data on MacOS

Apple has just deleted all popular security apps offered by well-known cyber-security vendor –  Trend Micro from its official Apple App Store after they were caught stealing users’ sensitive data without their consent. The following controversial apps in question include – – Dr Cleaner – Dr Cleaner Pro – Dr Antivirus – Dr Unarchiver – App...
Continue Reading
Instagram Just Got Hacked!

Instagram Just Got Hacked!

In an extensive hacking campaign, hundreds of users are reporting that their Instagram accounts have been attacked. Aside from losing access to their own personal Instagram account, their profile images, phone numbers, email addresses and bio info have been changed as well. These hackers are deliberately taking down people’s Instagram accounts, but exactly why and what...
Continue Reading
Hurricane Florence Cyber Security Scams

Hurricane Florence Cyber Security Scams

It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security organization....
Continue Reading
Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works with...
Continue Reading
UnityPoint Hacked

UnityPoint Hacked – 1.4 Million Patients’ Data Breached

A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information, driver’s...
Continue Reading
Phishing via Misspelling

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage of...
Continue Reading
Cloud Security Services

Cloud Security Services: How Secure Are They?

Cloud Security Services: How Secure Are They? The steady rise on popularity of cloud security services among businesses show no signs of slowing down, and it is only natural at this point to ask this relevant question: which one carries the heavier blame during a security breach? To answer, most cloud security breaches resulted from end...
Continue Reading
Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data transmitted...
Continue Reading
Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums Attackers posing as admins are asking users from crypto-community channel forums of Slack and Discord to infect themselves with malware through the use of simple, and rather dumb, social engineering tactics. Mac researchers agreed naming the malware OSX.Dummy, for a reason. The following command was shared to unknowing crypto forums:...
Continue Reading
1 2 3 6

Categories