Category

Anti Phishing Services
Chinese Malware Returns with a Vengeance
In 2013, InfoSec firm Mandiant released a blockbuster security report covering a state-supported hacking group known as APT1, or Comment Crew. The Chinese hackers accomplished a lasting infamy, attached to the effective hacks of in excess of 100 US organizations and the exfiltration of several terabytes of information. In particular, analysts have discovered a malware...
Continue Reading
Hetzner Suffers Yet Another Data Breach
South African subsidiary of Germany’s Hetzner Online, has advised customers that it has been a victim of a “data breach” which likely exposed all of their customers data. The data breach, according to Hetzner, was uncovered by their cyber security research team on October 5th 2018 when they apparently noticed an “unusual network activity.” The...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web
Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
GhostDNS
A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that...
Continue Reading
tech support scam
Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to...
Continue Reading
URL Spoofing on Safari Browsers
An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still...
Continue Reading
Credit Card Info
It appears that MageCart strikes again, but this time the target was a popular electronics retails store online which is Newegg. MageCart previously was behind the breach of British Airlines and Feedify. It was reported that MageCart has been stealing payment information from credit cards for over a month since it was injected according to...
Continue Reading
Mobile Apps as Spyware
Spies in the Digital World: Mobile Apps as Spyware? Have you ever heard of the times when Siri of Apple, Amazon of Alexa, Google Home of Google, and possibly Cortana of Microsoft were said to be listening to their consumers’ conversations even without these private virtual assistants being used? Sounds like a spyware. These concerns...
Continue Reading
Cheating Winner Malware Winner
Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on...
Continue Reading
1 2 3 4 5 6