Category

Cyber Security
malware protection
Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of...
Continue Reading
Online Love Scam Syndicate Busted
A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia...
Continue Reading
The Panda Banking Trojan Now Targeting the US, Japan & Canada
The Panda Banker is a banking Trojan that seems to be related to the Zeus Trojan. The Panda Banker, a recently uncovered banking Trojan, is related to one of the most famous and destructive banking Trojans in history. Zeus is quite an old threat that has spawned countless imitators. The Panda Banker is used to...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Facebook Breach
-But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But...
Continue Reading
Dark Web Crimes
“The Dark Web is no longer a hiding place for criminals!” Tweet from Europol, the pan-European law enforcement organization, after a meeting in May establishing a task force against the dark web. This is a very good sign. Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous...
Continue Reading
Hackers Stole $15Million from Cosmos Bank
Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation...
Continue Reading
Cold Boot Attacks - A Chilling Reality
A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and...
Continue Reading
URL Spoofing on Safari Browsers
An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still...
Continue Reading
1 7 8 9 10 11 13

Categories