Phishing threat timeline It will only take a fraction of a second to complete the entire phishing phase, from the time the first victim opens and clicks on malicious email, attachment or url – then reaction time shutting down phishing website or tracing email reference to moving on after a few hours as if nothing...Continue Reading
An address bar vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by a cyber-security researcher, which allows an attacker to pose his phishing domain as the targeted site. According to the researcher, the UC Browser phishing vulnerability exists only...Continue Reading
A cyber-security researcher based in Pakistan has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari Browser for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched, potentially leaving...Continue Reading
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server. ...Continue Reading
Scams targeting tax professionals in phishing scam emails involving payroll direct deposit and wire transfer have been on the increase, warns the Internal Revenue Service. The IRS and its Security Summit partners report that these business email compromise/business email spoofing (BEC/BES) tactics generally target all types of industries and employers, but recently the service has...Continue Reading
As we all know, online travel booking sites provides many advantages to travelers. It offers hassle-free management of bookings as it works 24/7, faster payment transaction, and less phone time. But nowadays where internet phishing is becoming more popular when it comes to online attacks, one should be very careful in choosing the best online...Continue Reading
Every day, hackers send out over 3.5 billion fake emails worldwide targeting companies to spear-phishing and spoofing cyberattacks. Most companies remain vulnerable to these phishing attacks simply because they’re not implementing industry-standard authentication protocols. Vast majority of these suspicious emails were found out to came from U.S.-based sources. Spear-phishing, as distinguished from regular phishing scams,...Continue Reading
Threat summary This affect latest UC Browser version 126.96.36.1994 and UC Browser Mini version 188.8.131.522. The vulnerability resides in the way User Interface on both browsers handles a special built-in feature that was otherwise designed to improve users Google search experience.The vulnerability, which has no CVE identifier as its discovered so recently, Browser could allow...Continue Reading
“Weaponization” of Social Media How are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone is a giant tactical weapon of the new cyber tacticians that seek out advantage from the digital information era. According to New York Times...Continue Reading
The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors. Despite the fact that...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.