Blog

Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works with...
Continue Reading
UnityPoint Hacked

UnityPoint Hacked – 1.4 Million Patients’ Data Breached

A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information, driver’s...
Continue Reading
Phishing Prevention

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage of...
Continue Reading
Mobile Apps as Spyware

Spies in the Digital World: Mobile Apps as Spyware?

Spies in the Digital World: Mobile Apps as Spyware? Have you ever heard of the times when Siri of Apple, Amazon of Alexa, Google Home of Google, and possibly Cortana of Microsoft were said to be listening to their consumers’ conversations even without these private virtual assistants being used? Sounds like a spyware. These concerns above...
Continue Reading
AI and Phishing

AI and Phishing: Best Offense or Great Defense

AI and Phishing: Best Offense or Great Defense The term AI is most often misinterpreted. There are people thinking of the T-1000 or those terminator robots that were trying to hunt down John Connor and eventually leads to the creation of SkyNet and towards the end of the world as we know it. These clichéd science...
Continue Reading
Cloud Security Services

Cloud Security Services: How Secure Are They?

Cloud Security Services: How Secure Are They? The steady rise on popularity of cloud security services among businesses show no signs of slowing down, and it is only natural at this point to ask this relevant question: which one carries the heavier blame during a security breach? To answer, most cloud security breaches resulted from end...
Continue Reading
Netflix phishing scams

Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data transmitted...
Continue Reading
Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums Attackers posing as admins are asking users from crypto-community channel forums of Slack and Discord to infect themselves with malware through the use of simple, and rather dumb, social engineering tactics. Mac researchers agreed naming the malware OSX.Dummy, for a reason. The following command was shared to unknowing crypto forums:...
Continue Reading
Anti Malware programs

Malvertisement: The Covert Advert

Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and inject...
Continue Reading
SamSam Ransomware

SamSam Ransomware is back with New Variant

SamSam Ransomware is back with New Variant Considered as the most infamous and well-known ransomware today, which alone stole over $325,000 in just 4 weeks since its first appearance last January, SamSam ransomware is back with a new plot in mind. Now it asks for the attacker’s password first before infection. Researchers found this particular malware...
Continue Reading
Cheating Winner Malware Winner

Cheating Winner Malware Winner

Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on for...
Continue Reading
Dark Web Monitoring

AADHAR Database leak has gone more viral in the Dark Web

AADHAR Database leak has gone more viral in the Dark Web It is a known fact for heavily curious internet users and security researchers that the Dark Web is place to go to whenever there are new breaches to find or purchase stuff that is not legal and off the grid from authorities. Sometimes these stuffs...
Continue Reading
Windows Malware Mylobot

High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics

High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand how...
Continue Reading
Coordinated Cyber-Attacks

Coordinated Cyber-Attacks known as #OpQatar Terrorizes Qatar Once Again

The ongoing Gulf feud between the small but rich country of Qatar versus its biggest friends and neighbouring countries of Saudi Arabia, UAE, Egypt and Bahrain continued their year-long conflict with more cyber-attacks in mind. #OpQatar Hacks are targeting and leaking sensitive information from their citizens and agencies once again. #OpQatar reached mainstream media on year...
Continue Reading
Cyber security

Adidas US Site: A hole in a shoe was a hole in Cyber Security

Adidas US Site: A hole in a shoe was a hole in Cyber Security It was just last 28th of June when the German based brand sporting supplies giant Adidas announced that there were unauthorized party that claims to have possessed limited data associated with certain Adidas consumers. What are included in the data breach? contact...
Continue Reading
Cybersecurity

Insider Threats

You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. We’re all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. But let’s throw it back...
Continue Reading
Emails threat

Are Your Emails Being Recorded Without Permission?

Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting relevant...
Continue Reading
Russian Antivirus Software: Kaspersky Lab

Russian Antivirus Software: Kaspersky Lab, officially banned by the US Government

Russian Antivirus Software: Kaspersky Lab, officially banned by the US Government. European Union considers the Antivirus “malicious” US agencies are now officially prohibited from using Kaspersky Lab along with all related services. Although no concrete evidence, this started after classified hacking materials for the National Security Agency (NSA), was hacked with the help of Kaspersky Antivirus,...
Continue Reading
Tech Support Scams

Alarming Increase of Tech Support Scams – And How NOT To Be Fooled

It is undeniably normal and, in most cases, smart that we seek help from tech support for any hardware/software issues we come across with, but with how scammers evolved lately, it is not surprising even tech support scams are on a dramatic rise over the last couple of years. Based on the records released by the...
Continue Reading
Trojan-like Chrome Extension Steals Bank Account Data

Trojan-like Chrome Extension Steals Bank Account Data

Visiting Google, Apple, Amazon or other legitimate online markets for downloading software content are, at best, safe. But although they are official sources we’ve come to fully accept and familiarize about, these are things which aren’t 100% safe. Take for example, a recent Google Chrome Extension called “Desbloquear Conteúdo” (Portuguese for “Unblock contents”), masquerades as a...
Continue Reading
1 12 13 14 15 16 18

Categories