Category

Cyber Security
Mobile Phishing Campaign
The campaign, labeled “Soula”, collects information via a spoofed login screen of one of the country’s leading search engines that pops up over the original webpage.   It sends the logged credentials to the attackers’ server even without accurate data confirmation, leading researchers to think that the cybercriminals are at research and information-gathering stage.  ...
Continue Reading
Anti-malware tools
Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals.   Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications.   SQLite is...
Continue Reading
New MacOS Phishing Scheme Found
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns.   A similar trick is used in the new version,...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...
Continue Reading
Data breach
A social planning and e-invitations service company named Evite detected a security breach when anunauthorized party acquired an inactive data storage file associated with the firm’s user accounts last April 15, 2019. This storage file contains customer’s information which includes names, usernames, email addresses, passwords, dates of birth, phone numbers, and mailing addresses.   Among...
Continue Reading
Recently, a successful cyberattack hit Oregon State University compromising personal information of hundreds of students including their family members. The university announced that a total of 636 students and family’s records containing personally identifiable information were compromised due to a cyberattack that occurred in early May 2019.   Individuals outside the university hacked an OSU...
Continue Reading
Malware and Adware Attacks Using WP Plugins
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken...
Continue Reading
In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of...
Continue Reading
cybersecurity
Several enterprise virtual private networking apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division.   An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public...
Continue Reading
UK Identity Theft and Cyber Fraud | Identity Fraud Prevention
As the years passed by, the rate of identity fraud and cyber fraud around UK rapidly increased causing to reach its highest record level this year. Researchers identified over 300,000 cases of fraudulent conduct recorded to the National Fraud Database in 2017, with data drawn from 306 organizations, including many major UK brands.Although these incidents...
Continue Reading
1 2 3 18