Category

Cyber Security
anti spyware malware
A German-based spyware organization named Wolf Intelligence coincidentally uncovered its very own corporate information, including observation targets’ data, travel paper outputs of its organizer and family, accounts of gatherings and that’s just the beginning. The accidental leak uncovered around 20 GB of the organization’s information, which was left unprotected in a command and control server...
Continue Reading
Security Weakpoint Impacts Multiple Linux and BSD Distros
All Linux and BSD variations that use the X.Org server bundle contain a powerlessness, security scientists as of late unveiled. This blemish could enable an assailant with restricted benefits to raise benefits and gain root framework get to, either utilizing a terminal or SSH session. Commonly, if a powerless variant of X.Org keeps running on...
Continue Reading
Saudi PetroChem Plant Hacking Blamed On Russians
Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of...
Continue Reading
Online Love Scam Syndicate Busted
A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia...
Continue Reading
The Panda Banking Trojan Now Targeting the US, Japan & Canada
The Panda Banker is a banking Trojan that seems to be related to the Zeus Trojan. The Panda Banker, a recently uncovered banking Trojan, is related to one of the most famous and destructive banking Trojans in history. Zeus is quite an old threat that has spawned countless imitators. The Panda Banker is used to...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Facebook Breach
-But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But...
Continue Reading
Dark Web Crimes
“The Dark Web is no longer a hiding place for criminals!” Tweet from Europol, the pan-European law enforcement organization, after a meeting in May establishing a task force against the dark web. This is a very good sign. Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous...
Continue Reading
Hackers Stole $15Million from Cosmos Bank
Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation...
Continue Reading
1 6 7 8 9 10 12

Categories