Category

Threat Advisory
Phishing : UK Tax Refund Scheme
Cybercriminals are getting an early start by promising U.K. computer users a sizable tax refund in an attempt to steal their personal data. Recipients of the email scam, which appeared to come from Her Majesty’s Revenue and Customs (HMRC) the U.K. government department responsible for collecting taxes, were told to visit a gateway portal to...
Continue Reading
Queensland Government Attacked By Cyber Criminals
A rather large group of international cyber attackers have just attacked the Queensland Government, with cyber researchers being forced to defend against several potentially catastrophic barrage of online attacks. Just early last year, the state government’s cyber security experts detected and stopped more than 20 distributed denial of service (DDoS) attacks, during which an average...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging
Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the...
Continue Reading
UK News Sites Fall Victim to Domain Spoofing
A new study from DNS-based cyber threat intelligence firm DomainTools has exposed how cyber attackers are now using domain-squatting to spread disinformation and fake news to the public as well. After analysing domains associated with leading UK media outlets – BBC News, The Guardian, Sky News, ITV News, and the Daily Mail – the firm...
Continue Reading
The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a...
Continue Reading
Apple’s Work and School Products Leaking Info
Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrolment Program. Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware
Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection.   The Add-On was developed by a German firm named Creative Software Solutions, it has over...
Continue Reading
Phishing using the ZeroFont Technique
Cyber criminals area at it again. And this time, they are after familiar territory – Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in this digital age, almost...
Continue Reading
Navigation Hacking: A Rising Threat in Modern Technology
With today’s modern technology, long drives are a thing of the past. Traveling and navigating is as easy as typing the location into your mobile device and voila! You now have a clear path towards your destination. It’s all thanks to the good ol’ GPS (Global Positioning System). As long as you have your smartphone...
Continue Reading
Marap Malware, A Phishing Campaign Targeting the Finance Industry
Cybersecurity experts have just discovered a new modular downloader that has the capability to download other modules and payloads. It’s embedded itself in large campaigns and primarily hitting major financial institutions, planting their seeds for possible future attacks. Named Marap by security researchers from Proofpoint, after its command and control (C&C) phone home parameter “param”...
Continue Reading
1 2 3 4 5

Categories