Blog

Weak Passwords Used by Government and Military

Weak Passwords Used by Government and Military

Identification and Verification is the foundation of security and we’re seeing significant evidence of its critical importance in the common trend of password- and credential-focused risks throughout the 2nd quarter of 2018. Regardless if it’s an elusive Identity-stealing malware or a brute force login attack, cyber attackers are adamant and concentrated on hacking passwords for easy...
Continue Reading
Amazon AWS leaked GoDaddy Business Secrets

Amazon AWS leaked GoDaddy Business Secrets

GoDaddy is a well-known hosting provider and domain name registry, and is one of the world’s largest SSL certificate providers. They have millions of clients all over the globe. To be a little specific, they have almost 18 million customers, and more than 75 million domain names registered. And just recently, a bunch of their internal...
Continue Reading
MageCart Script

MageCart Script Injected to Suck Out Credit Card Info

It appears that MageCart strikes again, but this time the target was a popular electronics retails store online which is Newegg. MageCart previously was behind the breach of British Airlines and Feedify. It was reported that MageCart has been stealing payment information from credit cards for over a month since it was injected according to reports...
Continue Reading
Cyber Security Scams

Hurricane Florence Cyber Security Scams

It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security organization....
Continue Reading
Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works with...
Continue Reading
UnityPoint Hacked

UnityPoint Hacked – 1.4 Million Patients’ Data Breached

A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information, driver’s...
Continue Reading
Phishing via Misspelling

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage of...
Continue Reading
Mobile Apps as Spyware

Spies in the Digital World: Mobile Apps as Spyware?

Spies in the Digital World: Mobile Apps as Spyware? Have you ever heard of the times when Siri of Apple, Amazon of Alexa, Google Home of Google, and possibly Cortana of Microsoft were said to be listening to their consumers’ conversations even without these private virtual assistants being used? Sounds like a spyware. These concerns above...
Continue Reading
AI and Phishing

AI and Phishing: Best Offense or Great Defense

AI and Phishing: Best Offense or Great Defense The term AI is most often misinterpreted. There are people thinking of the T-1000 or those terminator robots that were trying to hunt down John Connor and eventually leads to the creation of SkyNet and towards the end of the world as we know it. These clichéd science...
Continue Reading
Cloud Security Services

Cloud Security Services: How Secure Are They?

Cloud Security Services: How Secure Are They? The steady rise on popularity of cloud security services among businesses show no signs of slowing down, and it is only natural at this point to ask this relevant question: which one carries the heavier blame during a security breach? To answer, most cloud security breaches resulted from end...
Continue Reading
Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data transmitted...
Continue Reading
Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums

OSX.Dummy: Mac Malware Targets Crypto-Community Forums Attackers posing as admins are asking users from crypto-community channel forums of Slack and Discord to infect themselves with malware through the use of simple, and rather dumb, social engineering tactics. Mac researchers agreed naming the malware OSX.Dummy, for a reason. The following command was shared to unknowing crypto forums:...
Continue Reading
Malvertisement: The Covert Advert

Malvertisement: The Covert Advert

Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and inject...
Continue Reading
SamSam Ransomware

SamSam Ransomware is back with New Variant

SamSam Ransomware is back with New Variant Considered as the most infamous and well-known ransomware today, which alone stole over $325,000 in just 4 weeks since its first appearance last January, SamSam ransomware is back with a new plot in mind. Now it asks for the attacker’s password first before infection. Researchers found this particular malware...
Continue Reading
Cheating Winner Malware Winner

Cheating Winner Malware Winner

Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on for...
Continue Reading
AADHAR Database leak has gone more viral in the Dark Web

AADHAR Database leak has gone more viral in the Dark Web

AADHAR Database leak has gone more viral in the Dark Web It is a known fact for heavily curious internet users and security researchers that the Dark Web is place to go to whenever there are new breaches to find or purchase stuff that is not legal and off the grid from authorities. Sometimes these stuffs...
Continue Reading
Windows Malware Mylobot

High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics

High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand how...
Continue Reading
Coordinated Cyber-Attacks

Coordinated Cyber-Attacks known as #OpQatar Terrorizes Qatar Once Again

The ongoing Gulf feud between the small but rich country of Qatar versus its biggest friends and neighbouring countries of Saudi Arabia, UAE, Egypt and Bahrain continued their year-long conflict with more cyber-attacks in mind. #OpQatar Hacks are targeting and leaking sensitive information from their citizens and agencies once again. #OpQatar reached mainstream media on year...
Continue Reading
A hole in a shoe was a hole in cyber security

Adidas US Site: A hole in a shoe was a hole in Cyber Security

Adidas US Site: A hole in a shoe was a hole in Cyber Security It was just last 28th of June when the German based brand sporting supplies giant Adidas announced that there were unauthorized party that claims to have possessed limited data associated with certain Adidas consumers. What are included in the data breach? contact...
Continue Reading
Insider Threats

Insider Threats

You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. We’re all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. But let’s throw it back...
Continue Reading
1 7 8 9 10 11 14

Categories