Category

Anti- Malware
BitCoins
Two new sextortion movements being appropriated by means of the infamous Necurs botnet have as of late been distinguished by threat security specialists. The malicious con artists behind these fraudulent crusades are focusing on exploited individuals whose information has already been spilled.   The con artists guarantee to have trading off recordings of the person...
Continue Reading
Smoke Loader Malware just got heavier with PROPagate Injection
A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the...
Continue Reading
The Rotexy Trojan: banker and blocker
On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of...
Continue Reading
Phishing Attacks
The subtle elements of phishing tricks change from year to year. Here, we will talk about phishing email models from a portion of the best phishing plans of 2018. 1. Record Verification Attachments as email bait from legitimate website poses from major company believing that some issue exist with your account.   2. Cloud-Based File...
Continue Reading
Dharma Ransomware weaponizes itself with fresh Cmb variant
While security experts are still not finish decrypting newer variants of Dharma ransomed files (which terrorizes the digital landscape with its prolific Ransomware releases lately), it again strikes back using a .cmb encryption. It appears as if this malicious malware is expected to surface for a while, for currently no decryption method is working as...
Continue Reading
Bank Fraud detection and prevention
A fraudulent app impersonating a phone call recording functionality in the Google Play Store managed to take away thousands of euros from a couple of bank customers in Europe. The malicious app was planted in a QRecorder app, being advertised as an automatic call and voice recording tool. At the time of the analysis, it...
Continue Reading
Hotel Guest Fined for Hacking Hotel Wifi
A security engineer from Chinese multinational company Tencent hacked into the WiFi system of a hotel in Singapore and received a fine for publicly disclosing administrator login passwords. Zheng Dutao participated in the capture-the-flag competition during the Hack InThe Box security conference in Singapore at the end of August and decided to test the WiFi...
Continue Reading
Russian Fancy Bear Hacking Group Takes Advantage of UEFI Rootkit
What is the issue? Some of us are aware that in today’s generation cybercrime is rampant the same as how technology improves. UEFI is replacing BIOS as a firmware for most computers and mother boards. With the advancement of the firmware comes an exploit hackers can use. Once infected with this malware rootkit it will...
Continue Reading
EmoTet Malware
Anne Arundel County Library computers were just exposed to a computer virus, prompting officials to take the computers out of service and ask customers to monitor personal information for fraudulent activity. About 600 terminals were reportedly breached. It was announced Saturday that the computers were exposed to a virus called Emotet, which targets users through...
Continue Reading
PGA Americas Held Ransom for Bitcoins - iZOOlogic
Cyber Attackers have taken over the control of computer servers belonging to the PGA of America, demanding a bitcoin ransom from the famed golf association in order to return control to them. Officials were locked out of critical files that relate to the PGA Championship and the upcoming Ryder Cup in France. While trying to...
Continue Reading
1 2 3 4

Categories