Search Results

malware
Google Play Apps infected with Windows Keyloggers

Google Play Apps infected with Windows executable files

Security researchers from Unit 42 of Palo Alto Networks have just discovered Google Play Apps infected with malicious Windows Executable files. These infected apps specifically include teaching and tutorial apps – Learn to Draw Clothing (teaching people how to draw design clothing), Gymnastics Training (tutorial about gymnastics moves), and Modification Trail (an app showing ideas...
Continue Reading
Anti Malware programs

Malvertisement: The Covert Advert

Malvertising Sounds like a mouthful, I know. But it’s a word-blend (postmanteau) between Malware and Advertising. To put it simply, the use of online advertisement to spread Malware. Malvertising is what occurs when online advertising is used to spread malwares. Malvertising is what ensues when attackers purchase ad spaces in famous or legitimate websites and...
Continue Reading
SamSam Ransomware

SamSam Ransomware is back with New Variant

SamSam Ransomware is back with New Variant Considered as the most infamous and well-known ransomware today, which alone stole over $325,000 in just 4 weeks since its first appearance last January, SamSam ransomware is back with a new plot in mind. Now it asks for the attacker’s password first before infection. Researchers found this particular...
Continue Reading
Cybersecurity Insider Threats

Insider Threats

You might have heard of the threats that are built into machines, and the ones that are created by people to exploit loopholes in any given system. We’re all aware of the malwares and viruses, the phishing sites, fake accounts, and everything digital threat that exists in this day and age. But let’s throw it...
Continue Reading
Emails threat

Are Your Emails Being Recorded Without Permission?

Are Your Emails Being Recorded Without Permission? Emails have been around even before the boon of digital age, and they have contributed to quite a number of online threats so far. Now that privacy concerns start gaining sensational foothold as of late, we are being introduced to another kind of email threat that’s slowly getting...
Continue Reading
Tech Support Scams

Alarming Increase of Tech Support Scams – And How NOT To Be Fooled

It is undeniably normal and, in most cases, smart that we seek help from tech support for any hardware/software issues we come across with, but with how scammers evolved lately, it is not surprising even tech support scams are on a dramatic rise over the last couple of years. Based on the records released by...
Continue Reading
Trojan-like Chrome Extension Steals Bank Account Data

Trojan-like Chrome Extension steals Bank Account Data

Visiting Google, Apple, Amazon or other legitimate online markets for downloading software data content are, at best, safe. But although they are official sources we’ve come to fully accept and familiarize about, these are things which aren’t 100% safe. Take for example, a recent Google Chrome Extension called “Desbloquear Conteúdo” (Portuguese for “Unblock contents”), masquerades...
Continue Reading
Cyber Criminals

Cache Attack: Firefox as the New Weapon of Cyber Criminals

Web cache is data front liners that are automatically downloaded for faster bootup times during your next same-site visit. It’s a typical web practice that normally wouldn’t warrant any suspicions, but recent research now finds it vulnerable to cyber criminals abuse – and attack website’s visitors. The Research Team from PortSwigger Web Security, under the...
Continue Reading

RAT – From Remote Access Tool to Remote Access Trojan

Technology progressed as the needs of the people advanced. It can also be said that the needs were created, because technology advanced. With the advancement of technology we think about automating processes and doing things remotely, which is why Remote Access has been a popular software tool on computers to operate another computer from afar....
Continue Reading
Anti-Phishing Tips

Inventive Phishing

Not too long ago there has been waves of attack from phishing criminals which involves a differently sophisticated method by utilizing social media platforms such as Facebook and Twitter. Targets can most likely be banks, trading platforms and financial exchanges involving fiat and digital currencies who are in need of Anti-Phishing Solutions.   Here is...
Continue Reading
1 196 197 198 199 200 201