Category

Malware Protection
Redtail Anti-malware Anti-fraud Hackers Data Breach
Redtail Technology is the latest company left scrambling after inadvertently leaving client data exposed and vulnerable to outside parties. The advisor-focused customer relationship management (CRM) provider confirmed that a data exposure on March 4, left sensitive customer data in an unsecured environment, affecting “less than 1% of Redtail clients,” according to a statement provided by...
Continue Reading
Mac Malware Utilized by Hacking Group APT32 to Attack Servers
A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).   OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind...
Continue Reading
Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US.   Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the...
Continue Reading
Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism.   A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise.   It...
Continue Reading
Tech Data Suffers Major Data Leak
An American IT Giant has fixed a “major” data leak that exposed payment, invoice, account and contact information for the company’s reseller and MSP partners. It wasn’t clear if it’s a hacking incident or malware-related intrusion.   The Clearwater, Fla.-based IT distribution giant leaked some 264 gigabytes of client and employee corporate and personal data,...
Continue Reading
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
Sony smart TVs
Security vulnerabilities in Android-based Sony smart TVs allow attackers to access WiFi Passwords and the images stored on the devices.   The vulnerability resides in the Photo Sharing Plus which allows users to upload photos to Sony Smart TV through a smartphone. It affects not only the TV’s used at the home but also the...
Continue Reading
GoDaddy
GoDaddy and Palo Alto recently collaborated to take down some 15,000 subdomains promoting weight-loss products and other goods promising miraculous results. The websites sought to persuade millions of consumers into buying products backed by bogus endorsements purporting to be from celebrities including Stephen Hawking, Jennifer Lopez and Gwen Stefani.   The compromised sites were uncovered...
Continue Reading
Wireless Chipsets Affects Billions of Devices
ThreadX is a real-time operating system (RTOS) developed by Express Logic, capable of running in a rich set of different platforms and devices. It is actually the most deployed RTOS, with over 6.2 billion deployments, including IoT (Internet of Things) devices, modems, laptops such as Samsung Chromebooks and Microsoft Surface, and even gaming consoles like...
Continue Reading
Internet Got Hijacked
A measly Nigerian ISP has hijacked internet traffic meant for Google’s data centers. The incident, called a BGP hijack, occurred last November 12, between 13:12 and 14:35, Pacific Time, according to Google.   The incident was first detected and reported by an online service that monitors the routes that internet traffic takes through the smaller...
Continue Reading
1 2 3

Categories