Category

UK

UK Page 1

Fin Fisher all time stealthiest malware spyware

FinFisher: One of the all-time stealthiest malware

A team of researchers pursued a stealthy malware called FinFisher spyware, dubbed as FinSpy for short. Almost eight months of investigation in uncovering this 2011 malware that now packs different improvements and upgrades.    What are the discoveries in this FinFisher malware?  Based on the research, a highly sophisticated malware infection method is equipped in the latest version of Finspy malware. The attackers...
Continue Reading
3 Bugs 41 vulnerabilities fix Android mobile phone Security Update

3 Bug fixes and almost 41 vulnerabilities found in this month’s Android Security Update

For October, Google releases the Android security updates. They address a total of 41 vulnerabilities that ranges between high and critical severity.  Every fifth day of each successive month, Google releases a complete breakdown of the Android OS security patch. This also contains both framework and vendor fixes. Therefore, this update also includes the remedies for the ten...
Continue Reading
Virtual machines Python ransomware campaign ESXi

Virtual machines got targeted by a new Python ransomware

Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines.  This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...
Continue Reading
bypass bug vulnerability Visa Apple Pay contactless payments

A bypass bug was found in Visa and Apple Pay in making contactless payments

A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...
Continue Reading
fake security update Android flubot malware exploit devices

A fake security update tricks Android users into downloading malware that could potentially exploit their devices

A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly.  FluBot malware can steal passwords, financial details, and more...
Continue Reading
Ransomware Healthcare Delivery Organizations cyberattacks

An onslaught of Ransomware in Healthcare Delivery Organizations might result to grave danger

IT security professionals were surveyed by a certain institution to accurately understand the ins and outs of how COVID – 19 affects healthcare delivery organizations. This survey also helps them figure out how ransomware cyberattacks on patients’ information are being kept at bay by the HDOs.  As for the research mentioned above, ransomware has already impacted healthcare organizations, causing grave...
Continue Reading
Wi Fi Networks expose login credentials University users configuration flaws

Wi-Fi Networks expose login credentials of University users due to configuration flaws

Security researchers discovered multiple configuration flaws concerning the free Wi-Fi networks of many universities. The deficiency affects students and faculty members who connect via Android and Windows devices, allowing unauthorized hacker access and the likelihood of having their usernames and passwords breached.    This Configuration flaw in Wi-Fi networks endangers global organizations, as reported by analysts.    Over 3,000 configurations of the eduroam Wi-Fi network roaming service being used in European universities were reviewed by...
Continue Reading
Pegasus spyware fear execution cyberattacks malware

Pegasus spyware creates fear due to being exploited in the execution of cyberattacks

Investigations have been conducted regarding the Pegasus spyware’s suspicious activities in monitoring civil rights agencies, government figures, and journalists all over the world to operate a new wave of cyberattacks.  Pegasus is a spyware system built by NSO Group that allows reading text messages, tracking calls, and more ways of harvesting information from devices. Initially, spyware is offered as a tool to combat crime;...
Continue Reading
Lithuanian government get rid Chinese smart phones Xiaomi Huawei

Lithuanian government advises getting rid of Chinese smartphones

Americans and Europeans are allegedly being spied on via Chinese smartphones, according to the Lithuanian government. The government of Lithuania warns people to get rid of any Chinese mobile phones from Xiaomi or Huawei, based on the recently published report regarding the security issues of 5G smartphones from China. Xiaomi seems to favor the Chinese...
Continue Reading
Data breach Epik 15 million customers non-customers data leak

Data breach against Epik has affected 15 million of both customers and non-customers

It is confirmed by Epik, an online service provider, that an unauthorized intrusion has indeed transpired into their systems following an incident last week where a hacker called Anonymous has leaked over 180 GB worth of stolen data from them. The threat group has even taunted Epik’s initial response to the attack by altering their official knowledge...
Continue Reading
1 2 3 15