Category

Anti Malware Protection
Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions
Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019.   “The threat landscape is undoubtedly...
Continue Reading
DanaBot Banking Trojan Found Targeting European Countries
Security specialists from ESET unravel banking trojan named DanaBot being dispersed to European nations by means of spam messages. DanaBot is prominent for its multistage disease chain and secluded design. Earlier research from Trustwave, alongside ESET’s new research, recognizes DanaBot as containing a few segments — generally as powerful connection libraries (DLL) — that perform...
Continue Reading
Smoke Loader Malware just got heavier with PROPagate Injection
A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the...
Continue Reading
online fraud
Falling victim to online fraud Numerous online opportunists rely on deception in order to fulfill their crimes. Those committing online fraud scams are getting considerably more innovative in imitating legitimate businesses to get your information. Phishing emails trying to persuade you to give personal information are the most common. Different impersonators attempt to motivate you...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability
Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too....
Continue Reading
A Virus that decides whether your PC is good for Crypto-Mining or Ransomware
Ransomware and Cryptocurrency mining attacks have been very frequent this year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature but...
Continue Reading
Protecting your Website against Cyber Attacks
For an individual or any business their website and its contents mean a lot to them. It can be considered a very important asset or property in this digital age. A person or a group of people devote their time, effort, and other valuable resources to make sure that these assets are protected and secure....
Continue Reading
Cheap Android Smartphones discovered to have pre-installed Malware
Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously...
Continue Reading
Google Images Plagued by Malwares
Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malwares. It’s as if regular hacking of websites and servers is not enough, these criminals are now targeting legit hosted websites and its images, and using them as a tool to exploit vulnerabilities while remaining undetected. What’s even...
Continue Reading
hacker
The Lokibot malware is a Banking Trojan designed for information theft. It’s been around since 2015 and has targeted many users for quite some time. The original malware was created by “Carter”, a.k.a. “Lokistov”. It was then sold and distributed on the underground market (dark web) for prices ranging from $80 to as high as...
Continue Reading
1 2 3 4 6

Categories