Category

Anti Malware Protection
Triada malware
Lots of smartphone manufacturers are tricked into installing a malware trojan known as Triada, who masquerades as a software vendor believing this will help them add features to the standard Android OS. This Triada malware is designed to put spam and ads on their device. The creators of Triada then collects revenue from the ads...
Continue Reading
New MacOS Phishing Scheme Found
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns.   A similar trick is used in the new version,...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...
Continue Reading
Malware and Adware Attacks Using WP Plugins
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken...
Continue Reading
In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of...
Continue Reading
ransomware attack | best malware protection
A Washington-based food bank has been hit by a ransomware attack known as GlobeImposter 2.0,which encrypted all computers on their network leaving staff members unable to access files and emails. It has been confirmed that the ransomware attack happened around 2:00 am on Wednesday, June 5th, and at that there was no person present in...
Continue Reading
Shamoon malware
New variants of Shamoon disk-wiping malware were recently reported to cyber security experts this week from Italy. Shamoon malware was first spotted in the cyber-attack against Saudi Arabia and other oil companies in 2012 in which it erased data of more than 30,000 belonging to the companies.   In 2016 it was spotted in the...
Continue Reading
In a statement posted to its Web site today, Orlando, Fla. based hospitality firm Earl Enterprises said a data breach involving malware installed on its point-of-sale systems allowed cyber thieves to steal card details from customers between May 23, 2018 and March 18, 2019.   According to an analysis of that page, it appears the...
Continue Reading
Rowhammer attack
International academic researchers discovered a new variant of the Rowhammer attack,which they named asRAMBleed,that can be performed even if a system is patched against Rowhammer. The unfamiliar attack of this RAMBleed is that it targets devices to steal information, contrary to other Rowhammer attacks that alter existing data or elevate an attacker’s privileges. As many...
Continue Reading
hacking group | Malware check | Malware trojan
After being silent for almost two years, cybersecurity researchers made malware check and found out that FIN8 Hacking Group has returned, devising a new method of hacking the hotel-entertainment industry using an updated version of a malware trojan known as ShellTea/PunchBuggy Backdoor.This attack was thought to be the first attack delivered by the FIN8 group...
Continue Reading
1 2 3 9