Category

Anti Malware Protection
CARBANAK Banking Malware
What do we know about Carbanak malware As we all know Carbanak has its impressive portfolio holding in its reputation, considering it as the leading player for Advanced Threat Protection attack and believed to be one of the successful attack in the world used entirely for banks, financial institutions, hospitals, and restaurants. First seen on...
Continue Reading
DNS Hijacking Attack
What is Sea turtle attack? It’s not an attack of a vicious sea turtle to human as you are invading their territory. Sea Turtle attack is not like any other DNS hijacking or poisoning, it is labeled as another breed of campaign more refined than its predecessor. How is it different from other DNS hijacking...
Continue Reading
Malware and Spyware Protection
From the Abyss Researchers has recently unveil new form of sophisticated cyber espionage framework that has been active since at 2013,dubbed as the TajMahal named after one of its XML file used for exfiltration, and an unknown origin and crafter, Its modules and bundles functionality which have never been before seen in an advanced persistent...
Continue Reading
identity theft prevention
Over the past few weeks Facebook has been quite active partnering with different app makers for their Facebook platform to incorporate where users can also enjoy it. Profoundly has been moderately gaining fame and somehow trended. The app Profoundly is used to anonymize users who want to ask questions on Facebook. Despite the apps main...
Continue Reading
ASUS laptops
How secure are we? There’s no such thing as foolproof system at least now a days when all threat actors are looking for means on how to manhandle security loopholes. Gone are the days when secure haven as what we think it is–say our manufactures OEM are no longer excused to all sorts of attack....
Continue Reading
anti virus malware protection
Mobile phones in today’s generation are still selling like pancakes despite the stiff competition between different mobile phone manufacturers. Needless to say, mobile phones are still part of our daily lives which serves as a multi-functional tool from communication up to almost anything thanks to the applications made for mobile devices. It is well-known that...
Continue Reading
Android malware
A newly found type of Android malware has stolen cryptocurrency and banking data from in excess of 125 different applications. The “Gustuff” Trojan virus is said to pick up its popularity in the cybercriminal underworld given that it’s custom-made explicitly to take banking and crypto assets. Gustuff is accepted to be about a year old...
Continue Reading
Android apps
Our Mobile Application Monitoring team has been wary of the trend that mobile appstores including iTunes and Google Playstore has been getting malicious apps in their store. Now the deception of mobile apps continue, up to the point that it has reached the stage where it has been pre-installed by your Mobile Phone vendor. Classy...
Continue Reading
Ransomware
Risks when an operation gets disrupted How much does it affect a business no matter what size whenever its operations get disrupted? Huge sums of money, time, effort, and most of all the data that are involved in the operations of the business.  Consumer confidence? A plunge in the stakeholders confidence? How dangerous? Ransomware in...
Continue Reading
Gate.io Bitcoin Transactions Breached by Hacking StatCounter
Malicious Hackers have broken StatCounter, one of the web’s biggest web investigation stages, and have embedded pernicious code inside the organization’s principle website following content. As per Matthieu Faou, the ESET malware specialist who found the hack, this pernicious code seizes any Bitcoin exchanges made through the web interface of the Gate.io digital currency trade....
Continue Reading
1 2 3 8