Category

Cyber Security
Magecart
Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify...
Continue Reading
Australia Deemed One of the Most Vulnerable to Cyber Attack
Australia is among a number of countries in the world that is most susceptible to a cyberattack. According to a 2017 data from the Rapid7 National Exposure Index, Australia was ranked ninth (9th) among the most susceptible to cyber-attacks. Dr Maria Milosavljevic, CISO (Chief Information Security Officer) for the Department of Finance, Services and Innovation...
Continue Reading
Apple Removed Cyber Security Vendor’s Apps for Amassing User Data on MacOS
Apple has just deleted all popular security apps offered by well-known cyber-security vendor –  Trend Micro from its official Apple App Store after they were caught stealing users’ sensitive data without their consent. The following controversial apps in question include – – Dr Cleaner – Dr Cleaner Pro – Dr Antivirus – Dr Unarchiver –...
Continue Reading
Facebook Breach Update
Got logged out last Friday? (September 28). You are lucky if you did not experience that. The social media giant Facebook forcefully ended the session of 90 million Facebook users to secure the accounts affected by the recent breach. In our recent story we have covered details initially disclosed by Facebook which was available by...
Continue Reading
Instagram Just Got Hacked!
In an extensive hacking campaign, hundreds of users are reporting that their Instagram accounts have been attacked. Aside from losing access to their own personal Instagram account, their profile images, phone numbers, email addresses and bio info have been changed as well. These hackers are deliberately taking down people’s Instagram accounts, but exactly why and...
Continue Reading
Weak Passwords Used by Government and Military
Identification and Verification is the foundation of security and we’re seeing significant evidence of its critical importance in the common trend of password- and credential-focused risks throughout the 2nd quarter of 2018. Regardless if it’s an elusive Identity-stealing malware or a brute force login attack, cyber attackers are adamant and concentrated on hacking passwords for...
Continue Reading
Cyber Security Scams
It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security...
Continue Reading
Phishing Prevention
Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
AI and Phishing
AI and Phishing: Best Offense or Great Defense The term AI is most often misinterpreted. There are people thinking of the T-1000 or those terminator robots that were trying to hunt down John Connor and eventually leads to the creation of SkyNet and towards the end of the world as we know it. These clichéd...
Continue Reading
Malvertisement
Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and...
Continue Reading
1 8 9 10 11 12 13

Categories