Blog

Fraudulent Bank Apps

Fraudulent Bank Apps Possibly Acquired Thousands of Customer Data

Fraudulent applications of SBI (State Bank of India), ICICI India Ltd., Axis Bank, Citi and other large banks are accessible on Google Play, which may have stolen information of thousands of bank clients, asserts a report by an IT security firm. These phony android applications have the logo of individual banks which makes it troublesome for...
Continue Reading
New BotNet Entraps Your Smart Devices to Initiate DDoS Attacks

New BotNet Entraps Your Smart Devices to Initiate DDoS Attacks

Another botnet which is focusing on ineffectively anchored Web of Things (IoT) gadgets and servers with the end goal of Distributed-Denial-of-Service (DDoS) assaults.   The primary Chalubo bot isn’t just receiving confusion methods all the more regularly found in Windows-based malware but at the same time is utilizing code from Xor.DDoS and Mirai, the last of...
Continue Reading
Hackers Using Phishing Scams to Drive New Browser Hijacker

Hackers Using Phishing Scams to Drive New Browser Hijacker

Another phishing effort has been found that sidetracks clients to a hijacking malware. The phishing procedure utilized in this battle is additionally usually utilized by technical support tricks, that are known to utilize terrify strategies to bait exploited people. In this phishing effort, an email message shows a phony blunder message and telephone number. The message...
Continue Reading
The Usual Black Friday

The Usual Black Friday

What will you do this Black Friday? Me? I’m super energized, I’ll be… It’ll be extraordinary in light of the fact that… … Goodness I can’t lie. Like many individuals who work in IT I’ll be stowing away under my work area, trusting that everything will pass and endeavoring to fight off every one of the...
Continue Reading
Chinese Malware Returns with a Vengeance

Chinese Malware Returns with a Vengeance

In 2013, InfoSec firm Mandiant released a blockbuster security report covering a state-supported hacking group known as APT1, or Comment Crew. The Chinese hackers accomplished a lasting infamy, attached to the effective hacks of in excess of 100 US organizations and the exfiltration of several terabytes of information. In particular, analysts have discovered a malware that...
Continue Reading
Cryptohackers Breach StatCounter to Steal Bitcoins

Cryptohackers Breach StatCounter to Steal Bitcoins

Cryptocurrency suffered big revenue loss since the beginning of 2017 as hackers find it more lucrative leaving Ransomware behind, That is (US)$882 million in funds stolen via focused assaults throughout at the least 14 exchanges. This hack provides another to the checklist,” Waller advised TechNewsWorld. CyrGate.io bitcoin exchange platform account holders were breached after adding malicious...
Continue Reading
Hetzner Suffers Yet Another Data Breach

Hetzner Suffers Yet Another Data Breach

South African subsidiary of Germany’s Hetzner Online, has advised customers that it has been a victim of a “data breach” which likely exposed all of their customers data. The data breach, according to Hetzner, was uncovered by their cyber security research team on October 5th 2018 when they apparently noticed an “unusual network activity.” The ISP...
Continue Reading
35 million voter records on Dark Web

35 Million Voters’ Data for Sale on the Dark Web

Up to 35 million voter records have been found available to be purchased on a mainstream hacking discussion from 19 states, scientists found. Cyber Security Specialists on Monday said that they found Dark Web interchanges offering an extensive amount of voter databases available to be purchased – including profitable and identifiable data and voter history. This...
Continue Reading
Mobile Phone Security

Mobile Phone Security: All You Need to Know

In the advent of 21 Century Smartphones are gaining its popularity which distinguish from “featured” phones by their hardware capabilities and extensive mobile operating systems, that facilitate software, internet and multimedia functionality of which includes music, video, cameras and gaming, alongside core phone functions such as voice calls and text messaging.  Mobilephones are much more reliable...
Continue Reading
BotNet Affecting IoT Devices and Linux Servers

BotNet Affecting IoT Devices and Linux Servers

Security specialists from a cyber-security firm have found an IRC bot named as Shellbot that is focusing on Internet of Things (IoT) gadgets and Linux servers. The botnet is additionally fit for influencing Windows frameworks and Android gadgets. Usual Methodology The IRC bot is engineered with the assistance of a Shellbot variation that is composed in...
Continue Reading
Carding Works on Playstore: Games and Everything Else

Carding Works on Playstore : Games and Everything Else

The Dark web is full of contents that ranges from illegal weapons up to anything legal you may find. In today’s article we will expose what and how vulnerable Google Playstore is with some items we can find in the dark web. Those are stolen financial credentials that were skimmed, sniffed, and scanned from POS, ATMs,...
Continue Reading
dark web sites

Dark web Breaches November 13

As a Dark web expert with an expertise in monitoring tor sites and hidden services, We have been encountering many contents that are disturbing and straightforward illegal being peddled around the internet both surface and deep part of the web. A researcher like me discover that these things are the usual in the dark web especially...
Continue Reading
Best malware scanner

Banking Trojan that sniffs out browser and password history

The banking malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is to steal...
Continue Reading
ICANN’s Response to GDPR: Temporary Specification Survey

ICANN’s Response to GDPR: Temporary Specification Survey

Last October 31st we have posted an article on how GDPR of EU has affected and will continue to affect the fight against cybercrime, that being said with respect to the law passed for EU members ICANN has issued its response for the purpose of compliance. Since the response of ICANN was effective and already implemented,...
Continue Reading
Drupalgeddon 2: A Postmortem Analysis for Drupal’s Major Security Breach

Drupalgeddon 2: A Postmortem Analysis for Drupal’s Major Security Breach

Background   Just months ago, Drupal, one of the most famous Content Management System (or CMS) along with WordPress and Joomla, sparked a lot of controversies surrounding its alleged vulnerability of how easy it is for threat actors to compromise its system. We’re referring to what happened last March, on which two vulnerabilities, (CVE-2018-7600) and (CVE-2018-7602),...
Continue Reading
US$7.5M Worth of CryptoCurrencies stolen from Trade.io

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

Cyber Criminals have effectively pulled back 1.3 million of the stolen tokens. The Swiss cryptographic money trade is as yet exploring the reason for the rupture. Switzerland-based digital money trade Trade.io endured a break that brought about programmers taking around 50 million TIO (Trade.io tokens) from one of its wallets that was held in cool stockpiling....
Continue Reading
Hijacking UK Email Accounts for Phishing

Hijacking UK Email Accounts for Phishing

There has been a significant rise in stolen corporate email accounts that are being used in phishing attempts. This is according to a new report by security experts Barracuda. The security firm is claiming email accounts from employees all over the UK are being stolen. Hackers would then log into these accounts remotely and, posing as...
Continue Reading
Popular Browser Plugin – FoxIt – Has Vulnerabilities

Popular Browser Plugin – FoxIt – Has Vulnerabilities

Just recently, Cisco Talos took a closer look at the famous browser plugin called Foxit PDF Reader and found 18, yes, that’s right – 18 (eighteen) critical vulnerabilities. Widely known as an alternative to the famous Adobe Acrobat Reader, Foxit has been commonly known as a free-for-all tool designed to help users edit PDF (Portable Document...
Continue Reading
Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

The holiday season is fast approaching – this is just the perfect opportunity for cybercriminals to scam shoppers out of their hard-earned money. According to Experian data, online shopping fraud attacks rose 30 percent in 2017 from 2016. Online shoppers can be totally duped in a number of unsuspecting ways – Phishing emails may be sent...
Continue Reading
USB Type C – A Hackers Gateway

USB Type C – A Hackers Gateway

Plugging in the power — or at least what you think is power — to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cyber-criminal steal your identity. The laptop may even be...
Continue Reading
1 13 14 15 16 17 22