Blog

Hackers Stole $15Million from Cosmos Bank

Hackers Stole $13.4 million from Cosmos Bank

Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation revealed...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrollment Program.   Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
tech support scam

Mouse Cursor Hijacker: The New Scam

Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to be...
Continue Reading
Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite hack leads to children’s personal data being shared on dark web as scammers rack up huge in-play charges. For a measly £2.05 each, user logins and passwords of gamers are currently being sold on the lucrative online black market through this Fortnite hack. Fortnite is a game of survival wherein players can create a superhero...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection. The Add-On was developed by a German firm named Creative Software Solutions, it has over 220,000 installs...
Continue Reading
Phishing using the ZeroFont Technique

Cyber Attack: Phishing using the ZeroFont Technique

Cyber criminals area at it again. And this time, they are after familiar territory – Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in this digital age, almost everyone...
Continue Reading
Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and brand...
Continue Reading
URL Spoofing on Safari Browsers

URL Spoofing on Safari Browsers

An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched,...
Continue Reading
Magecart

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify platform....
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion electronic...
Continue Reading
Partnerstroka scam group makes its move with another Browlock variant

Partnerstroka scam group makes its move with another Browlock variant

An influx of newer tech support fraud made specifically for latest Google Chrome Windows users are permeating. The group that’s responsible belong to Partnerstroka, which has been a major key player when it comes to impersonating as tech support representatives and making a fool out of their victims. Their threat arsenal just got larger with the...
Continue Reading
Facebook Breach Update

Facebook Breach Update

But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But wait...
Continue Reading
Facebook Breach Update

Facebook Breach Update

Got logged out last Friday? (September 28). You are lucky if you did not experience that. The social media giant Facebook forcefully ended the session of 90 million Facebook users to secure the accounts affected by the recent breach. In our recent story we have covered details initially disclosed by Facebook which was available by that...
Continue Reading

Hurricane Florence Cyber Security Scams

It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security organization....
Continue Reading
Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works with...
Continue Reading
Google Play Apps infected with Windows Keyloggers

Google Play Apps infected with Windows executable files

Security researchers from Unit 42 of Palo Alto Networks have just discovered Google Play Apps infected with malicious Windows Executable files. These infected apps specifically include teaching and tutorial apps – Learn to Draw Clothing (teaching people how to draw design clothing), Gymnastics Training (tutorial about gymnastics moves), and Modification Trail (an app showing ideas of...
Continue Reading
UnityPoint Hacked

UnityPoint Hacked – 1.4 Million Patients’ Data Breached

A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information, driver’s...
Continue Reading
BankBot Anubis malware

Fake Google Store Apps infecting users with BankBot Anubis Malware

An ongoing influx of questionable developers submitting fake Android apps on Google Play Store increased its scale, hinting at a widespread malicious group dedicated in mobile theft-terrorism. These fake apps exploit the mobile downloader feature and covertly install BankBot Anubis malware on their victims. How did they got pass Google Play Store’s defense? Hackers up their...
Continue Reading
Phishing Prevention

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage of...
Continue Reading
Mobile Apps as Spyware

Spies in the Digital World: Mobile Apps as Spyware?

Spies in the Digital World: Mobile Apps as Spyware? Have you ever heard of the times when Siri of Apple, Amazon of Alexa, Google Home of Google, and possibly Cortana of Microsoft were said to be listening to their consumers’ conversations even without these private virtual assistants being used? Sounds like a spyware. These concerns above...
Continue Reading
1 15 16 17 18 19 22