Malware

What Is Formjacking and How to Protect Your Passwords Against It? screenshot

What Is Formjacking and How to Protect Your Passwords Against It?

Which are the two types of cyberattacks that are most frequently mentioned in the news? The first one that has probably crossed your mind is ransomware, and this is hardly surprising. Quite apart from the fact that... Read more

August 16, 2019
The Numbers Are In: $45 Billion Was Lost Due to Cyber Criminal Activity in 2018 screenshot

The Numbers Are In: $45 Billion Was Lost Due to Cyber Criminal Activity in 2018

The online world is so vast and complex that trying to detail even a small portion of it with any sort of accuracy is going to be next to impossible. That won't stop people from trying, though, and this is a good... Read more

July 17, 2019
Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware screenshot

Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware

We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how... Read more

June 11, 2019
7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach screenshot

7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach

Quite a few people were worried when Laboratory Corporation of America Holdings (better known as LabCorp) announced that it had suffered a cyberattack on July 16, 2018. This is not terribly surprising. After all,... Read more

June 7, 2019
Stop Making These 5 Configuration Mistakes screenshot

Stop Making These 5 Configuration Mistakes

Who is responsible for the current state of cybersecurity? At first glance, this looks like a simple question with a straightforward answer, but when you think about it, you'll see that it's a bit more complicated. On... Read more

May 10, 2019
How to Keep Data on USB Flash Drives Safe screenshot

How to Keep Data on USB Flash Drives Safe

What are the advantages and disadvantages of using USB drives? It's true that USB drives offer a large number of security advantages over regular or cloud storage methods, however, they are also not without their own... Read more

February 26, 2019
Warning! Password-stealing Malware Attacks are Still on the Rise in 2019 screenshot

Warning! Password-stealing Malware Attacks are Still on the Rise in 2019

Things are heating up again in the IT security sector. 2018 saw some notable changes done in that sector, with a few botnets neutralized, quite a few threats studied and countered by experts and quite a few hacker... Read more

August 16, 2019
Watch out for the Anubis Banking Malware That Can Put Your Virtual Privacy at Risk screenshot

Watch out for the Anubis Banking Malware That Can Put Your Virtual Privacy at Risk

If you ever find yourself wondering how large a large-scale cybercrime operation can be, you could do worse than take a look at the Anubis Android malware. The trojan has been around for at least five years now, but... Read more

July 10, 2019
Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute screenshot

Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute

Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale... Read more

June 11, 2019
Are Passwords in Danger When the Hawkeye Keylogger Attacks? screenshot

Are Passwords in Danger When the Hawkeye Keylogger Attacks?

The HawkEye keylogger has been around for about six years now and despite the fact that some would say it has silly name (for a malicious program), it's not just a simple hacking tool developed by a teenage computer... Read more

May 31, 2019
A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware screenshot

A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware

Many people assume that the only thing they need to do to protect their devices is to install some sort of security software. They tend to view anti-malware products as a panacea that can guarantee the safety of their... Read more

April 5, 2019
Why Are People Covering the Cameras on Their Laptops and Phones? screenshot

Why Are People Covering the Cameras on Their Laptops and Phones?

Last year, Lenovo unveiled its 2018 laptop models and proudly announced that they come with a brand new feature – a built-in cover the slides over the webcam and ensures that nobody can spy on you. Peculiarly, they... Read more

February 12, 2019
A Security Vulnerability in Steam's Windows Client Puts Gamers at Risk screenshot

A Security Vulnerability in Steam's Windows Client Puts Gamers at Risk

Many people who aren't entirely aware of how software works would be ready to start pulling their hair out if they hear that a major online gaming platform with millions of users suffers from a severe security... Read more

August 12, 2019
How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability screenshot

How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability

What exactly is the biggest problem of modern online security? Advanced hacking tools? Badly written software applications? Vendors that don't do enough to protect users' data? You could argue that technically, all... Read more

June 28, 2019
How to Protect Your Password From the Rootkit-Enabled Scranos Malware screenshot

How to Protect Your Password From the Rootkit-Enabled Scranos Malware

Beware, the Scranos rootkit malware, which has been running wild recently, can do serious damage to you by stealing your passwords and user credentials through a fake certificate. However, if you have become the... Read more

June 10, 2019
What Is Scareware and How to Avoid It? screenshot

What Is Scareware and How to Avoid It?

Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this.... Read more

May 22, 2019
Beware of Malware That Is Spread via LinkedIn DMs screenshot

Beware of Malware That Is Spread via LinkedIn DMs

There seems to be not a single platform that hackers and cyber attackers are not ready to exploit. They can expose you to malware via your own email inbox. They can create fictitious websites to expose you to scams.... Read more

April 1, 2019
FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign screenshot

FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign

How would you feel about a file-sharing platform that states in its FAQ something along the lines of 'Using our service for anything illegal is forbidden, but if you do decide to do it, we won't try to stop you'?... Read more

February 1, 2019
Loading...