Category

Anti Malware Protection
ASUS laptops
How secure are we? There’s no such thing as foolproof system at least now a days when all threat actors are looking for means on how to manhandle security loopholes. Gone are the days when secure haven as what we think it is–say our manufactures OEM are no longer excused to all sorts of attack....
Continue Reading
anti virus malware protection
Mobile phones in today’s generation are still selling like pancakes despite the stiff competition between different mobile phone manufacturers. Needless to say, mobile phones are still part of our daily lives which serves as a multi-functional tool from communication up to almost anything thanks to the applications made for mobile devices. It is well-known that...
Continue Reading
Android malware
A newly found type of Android malware has stolen cryptocurrency and banking data from in excess of 125 different applications. The “Gustuff” Trojan virus is said to pick up its popularity in the cybercriminal underworld given that it’s custom-made explicitly to take banking and crypto assets. Gustuff is accepted to be about a year old...
Continue Reading
Android apps
Our Mobile Application Monitoring team has been wary of the trend that mobile appstores including iTunes and Google Playstore has been getting malicious apps in their store. Now the deception of mobile apps continue, up to the point that it has reached the stage where it has been pre-installed by your Mobile Phone vendor. Classy...
Continue Reading
Ransomware
Risks when an operation gets disrupted How much does it affect a business no matter what size whenever its operations get disrupted? Huge sums of money, time, effort, and most of all the data that are involved in the operations of the business.  Consumer confidence? A plunge in the stakeholders confidence? How dangerous? Ransomware in...
Continue Reading
Gate.io Bitcoin Transactions Breached by Hacking StatCounter
Malicious Hackers have broken StatCounter, one of the web’s biggest web investigation stages, and have embedded pernicious code inside the organization’s principle website following content. As per Matthieu Faou, the ESET malware specialist who found the hack, this pernicious code seizes any Bitcoin exchanges made through the web interface of the Gate.io digital currency trade....
Continue Reading
Evernote for Windows
A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when...
Continue Reading
Artificial Intelligence
On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement...
Continue Reading
Macos Malware
Malware creators are continually searching for new and inventive approaches to stay away from location and increment benefits, so a report that an evidently new method was being conveyed against macOS clients a week ago made them start up our Virtual Machines to perceive what our foes had concocted this time.   Old Dog, New...
Continue Reading
CryptoJacking
Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault.   In a statement released on Nov. 4, the...
Continue Reading
1 2 3 8

Categories