Category

Anti-Phishing
Healthcare industry
Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data...
Continue Reading
DarkHotel
The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that...
Continue Reading
Hospital Data Breach
Huntsville Hospital in Alabama is informing work candidates about a data rupture that may have brought about the bargain of their own information. The data rupture happened in May 2018 yet the doctor’s facility came to think about it just in October 2018.   As indicated by the notice letters conveyed by the healing center,...
Continue Reading
Malware Attack on The Pakistani Military
The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known...
Continue Reading
Vishing Scam
Vishing, or voice phishing, is a phishing assault where fraudsters utilize the phone to distort their alliance or specialist with the expectation that unfortunate casualties will uncover qualifications or other individual data for further trade off. Regularly, vishing on-screen characters get the individual data of the person in question, including their telephone number, and start...
Continue Reading
Phishing Modus Using WhatsApp
What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners...
Continue Reading
Phishing
Cyber Security analysts have seen an ongoing switch in strategies by malicious threat actors’ resolved to leading shakedown activities. The essentially terrifying strategy in these phishing activities is to tell the beneficiary the blackmailer has humiliating or harming proof against the objective with an interest to pay a set sum all together for the pernicious...
Continue Reading
email phishing scams
Dubai’s largest bank has cautioned clients to be careful with another phishing email trick which professes to offer VAT discounts. Emirates NBD cautioned that an email with the headline VAT Refund Notification, professing to be from the bank, ought not to be opened.   “We ask you to be very watchful and dependably check the...
Continue Reading
Popular Browser Extension "Stylish" Discovered Stealing Your Browser Data
Both Google Chrome and Mozilla Firefox issued a permanent ban against the browser add-on “Stylish”, after Robert Heaton, a software engineer, accidentally found out that it covertly records browser data and sends them to questionable remote servers. Stylish is an add-on that allows users to personalize any website they visit. From changing color scheme to...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel
Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication...
Continue Reading
1 2 3 11

Categories