Malware
What Is Formjacking and How to Protect Your Passwords Against It?
Which are the two types of cyberattacks that are most frequently mentioned in the news? The first one that has probably crossed your mind is ransomware, and this is hardly surprising. Quite apart from the fact that... Read more
The Numbers Are In: $45 Billion Was Lost Due to Cyber Criminal Activity in 2018
The online world is so vast and complex that trying to detail even a small portion of it with any sort of accuracy is going to be next to impossible. That won't stop people from trying, though, and this is a good... Read more
Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware
We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how... Read more
7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach
Quite a few people were worried when Laboratory Corporation of America Holdings (better known as LabCorp) announced that it had suffered a cyberattack on July 16, 2018. This is not terribly surprising. After all,... Read more
Stop Making These 5 Configuration Mistakes
Who is responsible for the current state of cybersecurity? At first glance, this looks like a simple question with a straightforward answer, but when you think about it, you'll see that it's a bit more complicated. On... Read more
How to Keep Data on USB Flash Drives Safe
What are the advantages and disadvantages of using USB drives? It's true that USB drives offer a large number of security advantages over regular or cloud storage methods, however, they are also not without their own... Read more
Warning! Password-stealing Malware Attacks are Still on the Rise in 2019
Things are heating up again in the IT security sector. 2018 saw some notable changes done in that sector, with a few botnets neutralized, quite a few threats studied and countered by experts and quite a few hacker... Read more
Watch out for the Anubis Banking Malware That Can Put Your Virtual Privacy at Risk
If you ever find yourself wondering how large a large-scale cybercrime operation can be, you could do worse than take a look at the Anubis Android malware. The trojan has been around for at least five years now, but... Read more
Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute
Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale... Read more
Are Passwords in Danger When the Hawkeye Keylogger Attacks?
The HawkEye keylogger has been around for about six years now and despite the fact that some would say it has silly name (for a malicious program), it's not just a simple hacking tool developed by a teenage computer... Read more
A Vulnerability in Xiaomi's Guard Provider App Could Expose Devices to Malware
Many people assume that the only thing they need to do to protect their devices is to install some sort of security software. They tend to view anti-malware products as a panacea that can guarantee the safety of their... Read more
Why Are People Covering the Cameras on Their Laptops and Phones?
Last year, Lenovo unveiled its 2018 laptop models and proudly announced that they come with a brand new feature – a built-in cover the slides over the webcam and ensures that nobody can spy on you. Peculiarly, they... Read more
A Security Vulnerability in Steam's Windows Client Puts Gamers at Risk
Many people who aren't entirely aware of how software works would be ready to start pulling their hair out if they hear that a major online gaming platform with millions of users suffers from a severe security... Read more
How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability
What exactly is the biggest problem of modern online security? Advanced hacking tools? Badly written software applications? Vendors that don't do enough to protect users' data? You could argue that technically, all... Read more
How to Protect Your Password From the Rootkit-Enabled Scranos Malware
Beware, the Scranos rootkit malware, which has been running wild recently, can do serious damage to you by stealing your passwords and user credentials through a fake certificate. However, if you have become the... Read more
What Is Scareware and How to Avoid It?
Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this.... Read more
Beware of Malware That Is Spread via LinkedIn DMs
There seems to be not a single platform that hackers and cyber attackers are not ready to exploit. They can expose you to malware via your own email inbox. They can create fictitious websites to expose you to scams.... Read more
FormBook Uses a Shady File Hosting Service for Its Latest Password-Stealing Campaign
How would you feel about a file-sharing platform that states in its FAQ something along the lines of 'Using our service for anything illegal is forbidden, but if you do decide to do it, we won't try to stop you'?... Read more