Category

Brand Protection

Brand Protection Page 10

Drupalgeddon 2: A Postmortem Analysis for Drupal’s Major Security Breach

Drupalgeddon 2: A Postmortem Analysis for Drupal’s Major Security Breach

Background   Just months ago, Drupal, one of the most famous Content Management System (or CMS) along with WordPress and Joomla, sparked a lot of controversies surrounding its alleged vulnerability of how easy it is for threat actors to compromise its system. We’re referring to what happened last March, on which two vulnerabilities, (CVE-2018-7600) and...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in cybercrime which we have discussed on https://izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the...
Continue Reading
blog drupalgeddon image 3

Drupalgeddon V2 Update: Backdoors by utilizing Shellbot Malware

The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrollment Program.   Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom...
Continue Reading
Trusted and Recommended web security Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an web security add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection.   The web security Add-On was developed by a German firm named Creative Software...
Continue Reading
Facebook Breach Update

Facebook Breach Update

Got logged out last Friday? (September 28). You are lucky if you did not experience that. The social media giant Facebook forcefully ended the session of 90 million Facebook users to secure the accounts affected by the recent breach. In our recent story we have covered details initially disclosed by Facebook which was available by...
Continue Reading
Social Media Abuse

Social Media Abuse

Background iZOOlogic provides a suite of brand monitoring solutions to protect clients from social media abuse. Whilst providing an unparalleled method of instant and global communication, social media poses a significant risk to all major corporations and individuals. Platforms including Facebook, Instagram, YouTube, google+, Twitter and LinkedIn are widely manipulated to distribute phishing links. iZOOlogic works...
Continue Reading
UnityPoint Hacked

UnityPoint Hacked – 1.4 Million Patients’ Data Breached

A string of Phishing Attacks camouflaged as an internal email from one of the company’s executives was all it took for an employee to be duped and unknowingly grant access to the company’s database, right towards sensitive patient information. The data collection included names, patient DOBs, medical records, laboratory results, dates of services, insurance information,...
Continue Reading
Android Triple Threat

Triple Cyber Threat Approach Android

Phishing attacks in the cyber world is relentless as ever, because of new vulnerabilities with the evolution of technology. We can’t deny that these threats exist, because victims are gaining in numbers and falling prey to Android Banking Malware which is being used for phishing activities. It is not a surprise that techniques are combined...
Continue Reading
1 8 9 10 11