Blog

Russian Antivirus Software Kaspersky Lab officially banned by US

Russian Antivirus Software Kaspersky Lab officially banned by US

Russian antivirus software Kaspersky Lab has now been officially banned by the US Government. The recent hacking of classified National Security Agency (NSA) materials was attributed to the Kaspersky Lab Antivirus system, leading to the ban. The software has been associated with the Russian Secret Service and claimed to be spyware. The ban will be effective...
Continue Reading
malware virus protection

Mac-specific malware: the false sense of security with Macs

Recent research shows, with the widespread use of Apple devices, Mac-specific malware and viruses are now widespread. Apple Macs were once thought to be safer than Windows. Hackers found it more worthwhile to target Windows based operating systems with malware and viruses. A recent study conducted by a veritable IT security firm reported Mac-specific malware increased...
Continue Reading

What Does the Recent Cryptocurrency Exchange Hack Mean for Crypto Cyber Security?

What Does the Recent Cryptocurrency Exchange Hack Mean for Crypto Cyber Security? One of the largest cryptocurrency exchanges in Korea, Coinrail, was hacked in June. While Coinrail did not release an official figure for the stolen coins, The Guardian estimates that at least £27.8m worth of digital funds are now lost forever. The immediate result of...
Continue Reading
Cyber Criminals

Cache Attack: Firefox as the New Weapon of Cyber Criminals

Web cache is data front liners that are automatically downloaded for faster bootup times during your next same-site visit. It’s a typical web practice that normally wouldn’t warrant any suspicions, but recent research now finds it vulnerable to abuse – and attack website’s visitors. The Research Team from PortSwigger Web Security, under the supervision of its...
Continue Reading
Dark Web Monitoring

Within the Dark web: Markets and Differences

Monitoring the dark web, why do we need to do it? Dark Web monitoring has highlighted that those seeking thrills and hot deals are exposing themselves to a vortex of nefarious activity. There are many market places in the dark web exclusively accessed only through specific browsers such as TOR (The Onion Router). The darkweb has...
Continue Reading
Phishing Malware

Phishing: Additional Malware to the Arsenal of Tactics

A group of phishing criminals called Silver Terrier originating from Nigeria was known to change its tactics to improve its success rate on getting more victims. The group is not known to conduct sophisticated phishing attacks, and they still heavily rely on email phishing campaigns. However the group seemed to be dedicated to do more and...
Continue Reading
Crypto Phishing Attacks

MEWKit Drains ETH Wallet – Crypto Phishing Attack

We have to be aware on how our private information and security is being handled. Crypto currency exchanges are no exception, because malicious attacks such as phishing and its kind exist, and have already found a way to exploit the technology. Aside from technology being exploited, the general public is also a key aspect for attackers...
Continue Reading

Phishing Email Campaign: Mimicking and Spoofing – Another Social Engineering Technique

Phishing attacks are the most common to affect an individual or organisation. Phishing email campaigns are easy to execute and can use a combination of different techniques in order to get someone to provide their credentials via a fake login page. These attacks won’t stop, because in this age of information it is very easy to...
Continue Reading

Crypto Exchange Security – How Secure Are You?

How much do you trust the online sites you give your personal information to? Do you have the same level of trust and confidence when you provide the same information when you open a bank account? Where and how do you place your trust? Trust can be varying depending on each individual’s experience. Some doubt their...
Continue Reading

Triada Android Malware

What is the Triada Android Malware? It is a modular mobile device Trojan which specifically targets the Android platform. It is capable of penetrating the firmware itself that actively uses root access to alter system files. It exists mainly on the device’s RAM, which is why it is almost impossible to detect or remove. Triada Android...
Continue Reading

RAT – From Remote Access Tool to Remote Access Trojan

Technology progressed as the needs of the people advanced. It can also be said that the needs were created, because technology advanced. With the advancement of technology we think about automating processes and doing things remotely, which is why Remote Access has been a popular software tool on computers to operate another computer from afar. R.A.T...
Continue Reading
Phishing Powered by Advertisement

Phishing Powered by Advertisement -Cryptocurrency Hack

      Basically, the criminals were able to get their ads approved by Adwords far too easily. They have been advertising their websites to appear on the topmost results whenever the desired keyword hits. The popular victims of these phishing attacks are cryptocurrency users and cryptocurrency exchanges, but not limited to those group of people....
Continue Reading
Dark Web Monitoring - identity fraud protection

Your Life is Cheap – DarkWeb Monitoring

For criminals, life is cheap whether it be theirs or their victims. Criminals in the cyberspace are no different too. Lately, it has been a trend left and right that database leaks are frequently happening where people’s email address and password are exposed. However, that is just the tip of the iceberg, because those leaks could...
Continue Reading
Anti-Phishing Tips

Inventive Phishing

Not too long ago there has been waves of attack from phishing criminals which involves a differently sophisticated method by utilizing social media platforms such as Facebook and Twitter. Targets can most likely be banks, trading platforms and financial exchanges involving fiat and digital currencies. Here is how it works: After finding their target financial institution...
Continue Reading
Anti Phishing

Crypto Phishing – Simple Yet Effective

With the latest boom where a growing number of users trading Cryptocurrencies has caught the attention of cyber-criminals who dares to take advantage of this craze in order to gain their own fortune. It is quite alarming to acknowledge that scammers were on the loose to bring misfortune for their own fortune through methods such as...
Continue Reading
phishing prevention

Penetration Test To Prevent Phishing Injection

Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection to...
Continue Reading
Anti Phishing Service

Darkweb Alphabay Resurgence

Empire Market a Shadow of the Glorious Alphabay It is back and now with a different name. The former site which was well-known in the Dark Web used to be called Alphabay was seized and then shut down by the authorities. A lot of dark netizens were hopeful that the site would re-emerge with a clone...
Continue Reading
Anti Phishing

Malware as Browser Plugins

Watch out for browser extensions this time Previously we have been talking about mobile apps mostly on the Android environment that are being used to hijack malware into some legitimate looking apps in order to deploy different scripts to steal as much data to extort money either by combining phishing attack strategies or directly snoop data...
Continue Reading
Anti-Phishing Services

Phished Credentials Flourished on the Dark Web

What lies further beneath the Dark Web? It is undeniable that the surface web itself already has tons of problems especially when it comes to security. A web that is monitored and reachable by the government and authorities where cybercrime usually happens. It is because security does not rely solely on the technology itself, it is...
Continue Reading
SpriteCoin

Hottest New Currency They Say SpriteCoin

What is the new scam of the town? Cryptocurrency boom has been in effect and it has been the talk of town, a lot of businesses and individuals took advantage of the craze where some created their own cryptocurrencies to join in the hype. Of course cybercriminals also joined in the fray by using cryptocurrencies so...
Continue Reading
1 13 14 15 16 17 18

Categories