Blog

The Rotexy Trojan: banker and blocker

The Rotexy Trojan: banker and blocker

On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of this...
Continue Reading
data breach cost

What will a data breach cost you?

With our developing reliance on innovation, huge data breaches are more typical than any time in recent history. Between January 2005 and today, there have been more than 9000 breaks with more than 1.1 billion records uncovered, as per the ID Theft Resource Center. The biggest information breach in history was a hack on 500 million...
Continue Reading
Spyware and Malware protection

Responding to Impersonators ( online fraud )

Falling victim to online fraud Numerous online opportunists rely on deception in order to fulfill their crimes. Those committing online fraud scams are getting considerably more innovative in imitating legitimate businesses to get your information. Phishing emails trying to persuade you to give personal information are the most common. Different impersonators attempt to motivate you to...
Continue Reading
phishing assaults

Holiday shopping and holiday phishing

November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From that...
Continue Reading
Marriott Database Leak

Marriott Database Leak : Where will the data go?

Marriott Database Leak: Where will the data go? Following up with the recent Marriott Database Leak which has been said to be state sponsored by a rival state of USA, the leak is severe and could have contained details that are vital which may have included credit card details. In case the hackers behind the breach...
Continue Reading
Firefox Monitor

Has that website been pwned? Firefox Monitor will tell you

Firefox Monitor, a breach warning site propelled by Mozilla in September, would now be able to convey cautions from inside Firefox program. When the service goes live in the coming weeks, Firefox users running version 62 and later will see a symbol show up in the location bar when they visit a known breach site. Tapping...
Continue Reading
Phishing Attacks

Nine Major Phishing Attacks of 2018 (and How to Spot Them)

The subtle elements of phishing attacks and tricks change from year to year. Here, we will talk about phishing email models from a portion of the best phishing plans of 2018.   Record Verification Attachments as email bait from legitimate website poses from major company believing that some issue exist with your account.   Cloud-Based File...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability

Vulnerability: Unprivileged Linux users can execute any command

Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too. Below...
Continue Reading
torrent clients

TORRENTING: You could be helping hackers – and you don’t know it

TORRENTING: You could be helping hackers – and you don’t know it Every time you use your torrent client, you take a gamble. It doesn’t matter if it’s the usual chance of running in with some copyright organization; the web traffic using your torrent client is rarely 100% legal. But with technological advancements and research from...
Continue Reading
Rakhni Trojan: A New Breed of Cryptomining

Rakhni Trojan: A New Breed of Cryptomining

Rakhni, an old ransomware dating as far back as the year 2013, recently stepped up its game by adding a new devastating algorithm with its arsenal of attacks. It now decides whether to demand ransomware or secretly profit by installing a miner. How It Works The malware is shared via email attachment, often disguised as financial-related...
Continue Reading
Magecart have gotten smarter with their global card-skimming tactic

Magecart have gotten smarter with their global card-skimming tactic

In the wake of Ticketmaster UK’s website hacking by the infamous Magecart threat group just weeks ago, researchers have discovered how they managed to pull this no-easy-feat off: by hacking their third-party suppliers first. Magecart have already attacked over 800 e-commerce sites to date, and a huge of them can be credited to their employment of...
Continue Reading
Clipboard Hijacking image 2

Clipboard Hijacking

A new clipboard hijacking malware has been discovered this June, specifically targeting cryptocurrency credentials on matching accounts, mainly destination addresses, most notably for Bitcoin and Etherium users. So far, it has infected an estimated 300,000 computers worldwide, with a huge percentage running on Windows. In case you were wondering how this works, cryptocurrency transfers require users...
Continue Reading
A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Rakhni: A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Ransomware and Cryptocurrency mining attacks have been very frequent this year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature but make...
Continue Reading
Credit Card Breach

Dark Web: Credit Card Breach Dubbed Arabian Nights

Illicit cyber activities has been going on in the dark web. Despite the efforts of authorities and lawful groups, the trend of the black hats and cybercriminals still continues. Lately this month of July a dark web carding store known as Joker’s Stash has been releasing breached cards and dumps information from all around the world...
Continue Reading
Huge Data Breach Uncovers Industry Secrets

Huge Data Breach Uncovers Industry Secrets

Cyber Attacks are getting more and more frequent nowadays. From government institutions to hospitals, banks and other financial institutions. There’s almost no rest for cyber criminals and the amount of illegal activities they couldn’t accomplish. And their newest victim – The Auto Industry. Car manufacturers, or all manufacturers in general – normally go to great lengths...
Continue Reading
Protecting your Website against Cyber Attacks

Protecting your Website against Cyber Attacks

For an individual or any business their website and its contents mean a lot to them. It can be considered a very important asset or property in this digital age. A person or a group of people devote their time, effort, and other valuable resources to make sure that these assets are protected and secure. But...
Continue Reading
Cyber Hacking in Singapore’s Healthcare Systems

Cyber Hacking in Singapore’s Healthcare Systems

Cyber attackers have just stolen a whole bunch of personal and patient data in a record-breaking hack which occurred Friday, July 20th. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals (SingHealth) and other healthcare institutions. More than 1 Million patient’s personal records have been...
Continue Reading
Magniber Ransomware goes Global

Magniber Ransomware goes Global

Magniber has officially gone global. After painstakingly targeting only South Korean users, the ransomware expands its target landscape to Chinese locations (Macau, China, Singapore) and Malay ones (Malaysia, Brunei) with more sophistication in its coding. It may be a matter of time till it goes global. This ransomware wasn’t impressive before. It relied heavily with Command...
Continue Reading
Cheap Android Smartphones discovered to have pre-installed Malware

Cheap Android Smartphones discovered to have pre-installed Malware

Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously by...
Continue Reading
Money Laundering via Mobile Gaming

Money Laundering via Mobile Gaming

For anyone who has played many of the popular smartphone games will definitely agree, the need for in-game currency is essential. Most of the players are hooked upon the notion that in order to advance substantially in the game is to use or purchase their currency. Smartphone gamers often rely but get frustrated with the free...
Continue Reading
1 18 19 20 21 22 30