Blog

Facebook Breach

Facebook Breach

The latest Facebook breach has affected at least 90 million users worldwide after hackers exploited a vulnerability that allowed access to profile data. Users were logged out on September 28 as Facebook forcefully ended the session of social media users to secure the accounts affected by the recent breach. Hackers gained the ability to access profiles by...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the chat...
Continue Reading
Dark Web Crimes

European Cooperation To Fight and Stop Dark Web Crimes

“The Dark Web is no longer a hiding place for criminals!” Tweet from Europol, the pan-European law enforcement organization, after a meeting in May establishing a task force against the dark web. This is a very good sign. Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home...
Continue Reading
Cyber Security Experts Are Calling For Sharing And Classification of Resources on The Dark Web

Cyber Security Experts Are Calling For Sharing And Classification of Resources on The Dark Web

Terbium Labs, a Dark Web Intelligence Company has called for an industry-wide, standardized framework for evaluating and describing goods and services for sale on underground forums, after complaining that most research is inconsistent and misleading. They have gathered and analyzed 22 reports from 18 different sources dating back to 2013 to better understand how security vendors...
Continue Reading

Drupalgeddon V2 Update: Backdoors by utilizing Shellbot Malware

The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a bot...
Continue Reading
Hackers Stole $15Million from Cosmos Bank

Hackers Stole $13.4 million from Cosmos Bank

Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation revealed...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrollment Program.   Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
tech support scam

Mouse Cursor Hijacker: The New Scam

Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to be...
Continue Reading
Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite hack leads to children’s personal data being shared on dark web as scammers rack up huge in-play charges. For a measly £2.05 each, user logins and passwords of gamers are currently being sold on the lucrative online black market through this Fortnite hack. Fortnite is a game of survival wherein players can create a superhero...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection. The Add-On was developed by a German firm named Creative Software Solutions, it has over 220,000 installs...
Continue Reading
Phishing using the ZeroFont Technique

Cyber Attack: Phishing using the ZeroFont Technique

Cyber criminals area at it again. And this time, they are after familiar territory – Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in this digital age, almost everyone...
Continue Reading
Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and brand...
Continue Reading
URL Spoofing on Safari Browsers

URL Spoofing on Safari Browsers

An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched,...
Continue Reading
Magecart

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify platform....
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion electronic...
Continue Reading
Partnerstroka scam group makes its move with another Browlock variant

Partnerstroka scam group makes its move with another Browlock variant

An influx of newer tech support fraud made specifically for latest Google Chrome Windows users are permeating. The group that’s responsible belong to Partnerstroka, which has been a major key player when it comes to impersonating as tech support representatives and making a fool out of their victims. Their threat arsenal just got larger with the...
Continue Reading
Facebook Breach Update

Facebook Breach Update

But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But wait...
Continue Reading
Facebook Breach Update

Facebook Breach Update

Got logged out last Friday? (September 28). You are lucky if you did not experience that. The social media giant Facebook forcefully ended the session of 90 million Facebook users to secure the accounts affected by the recent breach. In our recent story we have covered details initially disclosed by Facebook which was available by that...
Continue Reading

Hurricane Florence Cyber Security Scams

It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security organization....
Continue Reading
Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works with...
Continue Reading
1 14 15 16 17 18 21