Category

Hacking

Hacking Page 25

Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and...
Continue Reading
Magecart

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify...
Continue Reading
Partnerstroka scam group makes its move with another Browlock variant

Partnerstroka scam group makes its move with another Browlock variant

An influx of newer tech support fraud made specifically for latest Google Chrome Windows users are permeating. The group that’s responsible belong to Partnerstroka, which has been a major key player when it comes to impersonating as tech support representatives and making a fool out of their victims. Their threat arsenal just got larger with...
Continue Reading
Phishing Prevention

Phishing via Misspelling

Phishing via Misspelling Phishing, no matter what form it takes is now considered to be the #1 security threat affecting users and their devices. While most phishing techniques have remained a stable cyber-attack over the years, affecting users on computers for as long as the internet has been around, hackers have learned to take advantage...
Continue Reading
Cloud Security Services

Cloud Security Services: How Secure Are They?

Cloud Security Services: How Secure Are They? The steady rise on popularity of cloud security services among businesses show no signs of slowing down, and it is only natural at this point to ask this relevant question: which one carries the heavier blame during a security breach? To answer, most cloud security breaches resulted from...
Continue Reading
Netflix phishing scams

Fake Netflix Scams Love Free Subscriptions

Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data...
Continue Reading
Anti Malware programs

Malvertisement: The Covert Advert

Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and...
Continue Reading
SamSam Ransomware

SamSam Ransomware is back with New Variant

SamSam Ransomware is back with New Variant Considered as the most infamous and well-known ransomware today, which alone stole over $325,000 in just 4 weeks since its first appearance last January, SamSam ransomware is back with a new plot in mind. Now it asks for the attacker’s password first before infection. Researchers found this particular...
Continue Reading
Cheating Winner Malware Winner

Cheating Winner Malware Winner

Cheating Winner Malware Winner Is there by any chance that you like to play multiplayer competitive games online, like Fortnite and PUBG? Then most players who are competitive in skills and spirit encounter overeager players who are taking advantage of glitches and cheats provided by 3rd party unauthorized programs. This trend has been going on...
Continue Reading
Coordinated Cyber-Attacks

Coordinated Cyber-Attacks known as #OpQatar Terrorizes Qatar Once Again

The ongoing Gulf feud between the small but rich country of Qatar versus its biggest friends and neighbouring countries of Saudi Arabia, UAE, Egypt and Bahrain continued their year-long conflict with more cyber-attacks in mind. #OpQatar Hacks are targeting and leaking sensitive information from their citizens and agencies once again. #OpQatar reached mainstream media on...
Continue Reading
1 23 24 25 26 27