Blog

Mobile Phone Security

Mobile Phone Security: All You Need to Know

In the advent of 21 Century Smartphones are gaining its popularity which distinguish from “featured” phones by their hardware capabilities and extensive mobile operating systems, that facilitate software, internet and multimedia functionality of which includes music, video, cameras and gaming, alongside core phone functions such as voice calls and text messaging.  Mobilephones are much more reliable...
Continue Reading
BotNet Affecting IoT Devices and Linux Servers

BotNet Affecting IoT Devices and Linux Servers

Security specialists from a cyber-security firm have found an IRC bot named as Shellbot that is focusing on Internet of Things (IoT) gadgets and Linux servers. The botnet is additionally fit for influencing Windows frameworks and Android gadgets. Usual Methodology The IRC bot is engineered with the assistance of a Shellbot variation that is composed in...
Continue Reading
Carding Works on Playstore: Games and Everything Else

Carding Works on Playstore : Games and Everything Else

The Dark web is full of contents that ranges from illegal weapons up to anything legal you may find. In today’s article we will expose what and how vulnerable Google Playstore is with some items we can find in the dark web. Those are stolen financial credentials that were skimmed, sniffed, and scanned from POS, ATMs,...
Continue Reading
dark web sites

Dark web Breaches November 13

As a Dark web expert with an expertise in monitoring tor sites and hidden services, We have been encountering many contents that are disturbing and straightforward illegal being peddled around the internet both surface and deep part of the web. A researcher like me discover that these things are the usual in the dark web especially...
Continue Reading
banking malware

Banking Trojan that sniffs out browser and password history

The banking malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is to steal...
Continue Reading
ICANN’s Response to GDPR: Temporary Specification Survey

ICANN’s Response to GDPR: Temporary Specification Survey

Last October 31st we have posted an article on how GDPR of EU has affected and will continue to affect the fight against cybercrime, that being said with respect to the law passed for EU members ICANN has issued its response for the purpose of compliance. Since the response of ICANN was effective and already implemented,...
Continue Reading
US Election Day: No Malicious Cyber Activity So Far

US Election Day: No Malicious Cyber Activity So Far

As midterm decision results are counted, authorities said Tuesday that they have not seen any pernicious digital action focusing on the election framework. Branch of Homeland Security authorities held intermittent press calls to issue refreshes Tuesday, tending to in the event that they’ve needed to manage endeavored obstruction. Soon after 9 p.m. EST, authorities were keeping...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web

Hackers Found Selling Pakistani Bank Data on the Dark Web

Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out how...
Continue Reading
100K Home Routers Hacked via UPnP Vulnerability

100K Home Routers Hacked via UPnP Vulnerability

By and by, a hundred thousand or more home switches have been press-ganged into a spam-heaving botnet, this time by means of Universal Plug and Play (UPnP). As indicated by brainiacs from 360 Netlab, the malware misuses vulnerabilities in a Broadcom UPnP usage to taint helpless portals, and that implies a heap of switch makers are...
Continue Reading
US$7.5M Worth of CryptoCurrencies stolen from Trade.io

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

Cyber Criminals have effectively pulled back 1.3 million of the stolen tokens. The Swiss cryptographic money trade is as yet exploring the reason for the rupture. Switzerland-based digital money trade Trade.io endured a break that brought about programmers taking around 50 million TIO (Trade.io tokens) from one of its wallets that was held in cool stockpiling....
Continue Reading
American Express Data Breach Exposed 700K User Info

American Express Data Breach Exposed 700K User Info

Around 700,000 clients of American Express India’s information were left uncovered in an unbound database. The unintentional information spill was caused by a MongoDB server that was left uncovered with no secret phrase security. The unbound database contained 689,272 records in plaintext and available to anybody on the web. As per Bob Diachenko, Chief of Cyber...
Continue Reading
Hijacking UK Email Accounts for Phishing

Hijacking UK Email Accounts for Phishing

There has been a significant rise in stolen corporate email accounts that are being used in phishing attempts. This is according to a new report by security experts Barracuda. The security firm is claiming email accounts from employees all over the UK are being stolen. Hackers would then log into these accounts remotely and, posing as...
Continue Reading
Popular Browser Plugin – FoxIt – Has Vulnerabilities

Popular Browser Plugin – FoxIt – Has Vulnerabilities

Just recently, Cisco Talos took a closer look at the famous browser plugin called Foxit PDF Reader and found 18, yes, that’s right – 18 (eighteen) critical vulnerabilities. Widely known as an alternative to the famous Adobe Acrobat Reader, Foxit has been commonly known as a free-for-all tool designed to help users edit PDF (Portable Document...
Continue Reading
Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

The holiday season is fast approaching – this is just the perfect opportunity for cybercriminals to scam shoppers out of their hard-earned money. According to Experian data, online shopping fraud attacks rose 30 percent in 2017 from 2016. Online shoppers can be totally duped in a number of unsuspecting ways – Phishing emails may be sent...
Continue Reading
USB Type C – A Hackers Gateway

USB Type C – A Hackers Gateway

Plugging in the power — or at least what you think is power — to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cyber-criminal steal your identity. The laptop may even be...
Continue Reading
anti spyware malware

Start-up Spyware Company from Germany Accidentally Exposed Its Data Online

A German-based spyware organization named Wolf Intelligence coincidentally uncovered its very own corporate information, including observation targets’ data, travel paper outputs of its organizer and family, accounts of gatherings and that’s just the beginning. The accidental leak uncovered around 20 GB of the organization’s information, which was left unprotected in a command and control server and...
Continue Reading
Trading Platform and Cryptocurrency Hacks Blamed on North Korea

Trading Platform and Cryptocurrency Hacks Blamed on North Korea

North Korea’s programmers and agents have completely embraced digital currency as a strategy for bypassing global authorizes and raising assets for the Pyongyang administration. Two reports discharged in the previous two weeks by Group-IB and Recorded Future, individually, uncover the profundities to which North Korea has gone to do as such, depending on hacks of digital...
Continue Reading
Security Weakpoint Impacts Multiple Linux and BSD Distros

Security Weakpoint Impacts Multiple Linux and BSD Distros

All Linux and BSD variations that use the X.Org server bundle contain a powerlessness, security scientists as of late unveiled. This blemish could enable an assailant with restricted benefits to raise benefits and gain root framework get to, either utilizing a terminal or SSH session. Commonly, if a powerless variant of X.Org keeps running on a...
Continue Reading
malware protection

Saudi PetroChem Plant Hacking Blamed On Russians

Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of framework....
Continue Reading
Phony Android Apps Posing as CryptoMiners

Phony Android Apps Posing as CryptoMiners

Several Android applications were discovered acting like mineworkers for unminable digital forms of money, for example, Swell, Cardano, and Tie. The newfound malignant applications were discovered to have been “covering up under the radar” since May 2018. Security specialists have found a few pernicious Android applications hiding in outsider applications that are acting like digital money...
Continue Reading
1 7 8 9 10 11 16

Categories