Category

Site Take Down
Cloud Security Services
Cloud Security Services: How Secure Are They? The steady rise on popularity of cloud security services among businesses show no signs of slowing down, and it is only natural at this point to ask this relevant question: which one carries the heavier blame during a security breach? To answer, most cloud security breaches resulted from...
Continue Reading
Fake Netflix Scams Love Free Subscriptions
Fake Netflix Scams Love Free Subscriptions Netflix phishing scams have been around for years, but researchers warn the public of a newer scam that sends its victims to malicious Netflix-looking sites with TLS certificates. Transport Layer Security (TLS) certificate, a successor to SSL, is an Internet protocol that enables privacy, integrity and protection of data...
Continue Reading
Windows Malware Mylobot
High-level Windows Malware, Mylobot, Deploys Deadly Botnet Tactics A new Windows malware is adding systems into a botnet. It takes absolute control of its victims and also deliver additional malicious payloads. As far as the investigation goes, whoever’s the author of Mylobot malware campaign has to be a sophisticated and certainly capable hacker. To understand...
Continue Reading
Coordinated Cyber-Attacks
The ongoing Gulf feud between the small but rich country of Qatar versus its biggest friends and neighbouring countries of Saudi Arabia, UAE, Egypt and Bahrain continued their year-long conflict with more cyber-attacks in mind. #OpQatar Hacks are targeting and leaking sensitive information from their citizens and agencies once again. #OpQatar reached mainstream media on...
Continue Reading
Alarming Increase of Tech Support Scams - And How NOT To Be Fooled
It is undeniably normal and, in most cases, smart that we seek help from tech support for any hardware/software issues we come across with, but with how scammers evolved lately, it is not surprising even tech support scams are on a dramatic rise over the last couple of years. Based on the records released by...
Continue Reading
Firefox as the New Weapon of Cyber Criminals
Web cache is data front liners that are automatically downloaded for faster bootup times during your next same-site visit. It’s a typical web practice that normally wouldn’t warrant any suspicions, but recent research now finds it vulnerable to abuse – and attack website’s visitors. The Research Team from PortSwigger Web Security, under the supervision of...
Continue Reading
Anti Phishing
With the latest boom where a growing number of users trading Cryptocurrencies has caught the attention of cyber-criminals who dares to take advantage of this craze in order to gain their own fortune. It is quite alarming to acknowledge that scammers were on the loose to bring misfortune for their own fortune through methods such...
Continue Reading
Phishing Solution
Protecting a website As a website owner to promote and conduct transactions for your own business using the internet is beneficial to the business. A website is considered to be a company or an individual’s representative in the online world. As the perceived representation of an entity or individual it is logical to apply protection...
Continue Reading
Cybersquatting Domain Profiteering, Brand Protection
The Cyber world of Today The World Wide Web is a huge space where a lot of people gather, interact, educate, and etc. With a lot of activities which feed people’s minds and the ability to conduct a lot of transactions in the internet space, it is a pretty convenient space for the majority of...
Continue Reading
Equifax Data Breach Surprise | iZOOlogic
Equifax Data Breach Lately, a major consumer credit reporting company was attacked by hackers which resulted in a massive data breach. The data breach affected those who had a credit history in the US, UK, and Canada. An estimated 143 million people were affected by the breach. Equifax recently announced the incident but the company...
Continue Reading
1 2

Categories