Category

Anti- Malware
tech support scam
Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to...
Continue Reading
Apple Removed Cyber Security Vendor’s Apps for Amassing User Data on MacOS
Apple has just deleted all popular security apps offered by well-known cyber-security vendor –  Trend Micro from its official Apple App Store after they were caught stealing users’ sensitive data without their consent. The following controversial apps in question include – – Dr Cleaner – Dr Cleaner Pro – Dr Antivirus – Dr Unarchiver –...
Continue Reading
Weak Passwords Used by Government and Military
Identification and Verification is the foundation of security and we’re seeing significant evidence of its critical importance in the common trend of password- and credential-focused risks throughout the 2nd quarter of 2018. Regardless if it’s an elusive Identity-stealing malware or a brute force login attack, cyber attackers are adamant and concentrated on hacking passwords for...
Continue Reading
Hurricane Florence Cyber Security Scams
It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security...
Continue Reading
Malvertisement: The Covert Advert
Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and...
Continue Reading
Windows Malware Mylobot
High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand...
Continue Reading
Recent research shows, with the widespread use of Apple devices, Mac-specific malware and viruses are now widespread. Apple Macs were once thought to be safer than Windows. Hackers found it more worthwhile to target Windows based operating systems with malware and viruses. A recent study conducted by a veritable IT security firm reported Mac-specific malware...
Continue Reading
What is the Triada Android Malware? It is a modular mobile device Trojan which specifically targets the Android platform. It is capable of penetrating the firmware itself that actively uses root access to alter system files. It exists mainly on the device’s RAM, which is why it is almost impossible to detect or remove. Triada...
Continue Reading
Anti Phishing Service
Not too long ago there has been waves of attack from phishing criminals which involves a differently sophisticated method by utilizing social media platforms such as Facebook and Twitter. Targets can most likely be banks, trading platforms and financial exchanges involving fiat and digital currencies. Here is how it works: After finding their target financial...
Continue Reading
Anti Phishing
Watch out for browser extensions this time Previously we have been talking about mobile apps mostly on the Android environment that are being used to hijack malware into some legitimate looking apps in order to deploy different scripts to steal as much data to extort money either by combining phishing attack strategies or directly snoop...
Continue Reading
1 2

Categories