Category

Malware Protection
Popular Browser Plugin – FoxIt – Has Vulnerabilities
Just recently, Cisco Talos took a closer look at the famous browser plugin called Foxit PDF Reader and found 18, yes, that’s right – 18 (eighteen) critical vulnerabilities. Widely known as an alternative to the famous Adobe Acrobat Reader, Foxit has been commonly known as a free-for-all tool designed to help users edit PDF (Portable...
Continue Reading
Phony Android Apps Posing as CryptoMiners
Several Android applications were discovered acting like mineworkers for unminable digital forms of money, for example, Swell, Cardano, and Tie. The newfound malignant applications were discovered to have been “covering up under the radar” since May 2018. Security specialists have found a few pernicious Android applications hiding in outsider applications that are acting like digital...
Continue Reading
Mac Malware Targets Crypto-Community Forums
OSX.Dummy: Mac Malware Targets Crypto-Community Forums Attackers posing as admins are asking users from crypto-community channel forums of Slack and Discord to infect themselves with malware through the use of simple, and rather dumb, social engineering tactics. Mac researchers agreed naming the malware OSX.Dummy, for a reason. The following command was shared to unknowing crypto...
Continue Reading
Recent research shows, with the widespread use of Apple devices, Mac-specific malware and viruses are now widespread. Apple Macs were once thought to be safer than Windows. Hackers found it more worthwhile to target Windows based operating systems with malware and viruses. A recent study conducted by a veritable IT security firm reported Mac-specific malware...
Continue Reading
Firefox as the New Weapon of Cyber Criminals
Web cache is data front liners that are automatically downloaded for faster bootup times during your next same-site visit. It’s a typical web practice that normally wouldn’t warrant any suspicions, but recent research now finds it vulnerable to abuse – and attack website’s visitors. The Research Team from PortSwigger Web Security, under the supervision of...
Continue Reading
Anti Phishing
Watch out for browser extensions this time Previously we have been talking about mobile apps mostly on the Android environment that are being used to hijack malware into some legitimate looking apps in order to deploy different scripts to steal as much data to extort money either by combining phishing attack strategies or directly snoop...
Continue Reading
Android Phishing App Catelites
Recently there has been a new Android malware which runs rampant that targets your bank credentials straight right off your fingertips. This is not a new case where phishing apps pretend to be a legitimate banking app just to steal your credentials. However, this time it keeps evolving and gets more deceitful. Adaptive Nature The...
Continue Reading
Bitcoin Security Concerns
Why is it such a boom? Bitcoin has been popular for quite some now. It used to be a quiet digital currency for a few people at first, because of its growth and potential it has been slowly been building up popularity, and with popularity comes the interest of the masses growing steady and slow....
Continue Reading
Cybersecurity and Attack Mitigation (Phishing) We can all agree that prevention is better than cure in any situation whether it be critical or not. After all who wants to deal with a problem just because there were no precautions done? Especially in today’s cyberspace, digital crimes do happen left and right. Sometimes the victims do...
Continue Reading
Rouge Employees Corporate Cybercrime, Anti-Malware Solution, Phishing Solutions
Employee gone rogue is definitely a threat to the integrity of your data, especially those who have a high rank due to their access and privilege, but fingers do not exclusively point to high ranking employees. What could be the possible risks? Data Theft Robbery(inside job) Online forgery Phishing activities A lot of incidents could...
Continue Reading
1 2

Categories