Threats

Warning! Password-stealing Malware Attacks are Still on the Rise in 2019 screenshot

Warning! Password-stealing Malware Attacks are Still on the Rise in 2019

Things are heating up again in the IT security sector. 2018 saw some notable changes done in that sector, with a few botnets neutralized, quite a few threats studied and countered by experts and quite a few hacker... Read more

August 16, 2019
Dangerous Malware Came Pre-Installed on Android Phones, and No One Did Anything for Years screenshot

Dangerous Malware Came Pre-Installed on Android Phones, and No One Did Anything for Years

When you purchase a new smartphone, it always comes with plenty of apps pre-installed. These are meant to make your experience easy and fun from the get-go. Depending on the phone and the operating system running on... Read more

July 31, 2019
How to Create a Ransomware Backup Plan screenshot

How to Create a Ransomware Backup Plan

Why you need to create a plan in the case of a Ransomware attack In this day and age, data can be a company's most precious asset, and it falls to the company itself to keep the data safe. While companies that employ... Read more

July 18, 2019
How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability screenshot

How Hackers Compromised Cambridge University's Security to Spread Malware via a Firefox Zero-Day Vulnerability

What exactly is the biggest problem of modern online security? Advanced hacking tools? Badly written software applications? Vendors that don't do enough to protect users' data? You could argue that technically, all... Read more

June 28, 2019
Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware screenshot

Yet Another Spam Campaign Uses CVE-2017-11882 to Deliver Malware

We recently touched upon the problem of vulnerability management and patching. The fact of the matter is, a very large portion of users and organizations that rely heavily on computers are completely unaware of how... Read more

June 11, 2019
7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach screenshot

7.7 Million LabCorp Customers Were Potentially Hit by a Massive Data Breach

Quite a few people were worried when Laboratory Corporation of America Holdings (better known as LabCorp) announced that it had suffered a cyberattack on July 16, 2018. This is not terribly surprising. After all,... Read more

June 7, 2019
A Security Vulnerability in Steam's Windows Client Puts Gamers at Risk screenshot

A Security Vulnerability in Steam's Windows Client Puts Gamers at Risk

Many people who aren't entirely aware of how software works would be ready to start pulling their hair out if they hear that a major online gaming platform with millions of users suffers from a severe security... Read more

August 12, 2019
FaceApp Might Be Bad, but Fake Lookalikes Might Be Worse screenshot

FaceApp Might Be Bad, but Fake Lookalikes Might Be Worse

If you do not know what FaceApp is, you must have been on a social media detox lately because this app has been shoved down our throats via Instagram, Twitter, Facebook, all imaginable online news outlets (from The... Read more

July 29, 2019
The Numbers Are In: $45 Billion Was Lost Due to Cyber Criminal Activity in 2018 screenshot

The Numbers Are In: $45 Billion Was Lost Due to Cyber Criminal Activity in 2018

The online world is so vast and complex that trying to detail even a small portion of it with any sort of accuracy is going to be next to impossible. That won't stop people from trying, though, and this is a good... Read more

July 17, 2019
How to Recognize and Prevent Common LinkedIn Phishing Emails screenshot

How to Recognize and Prevent Common LinkedIn Phishing Emails

Recently, we've been getting news of new LinkedIn-related phishing attacks. According to the news, the hackers use an array of assorted schemes in order to pressure their targets into visiting web pages laced with... Read more

June 20, 2019
Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute screenshot

Change Your Weak Server Passwords ASAP If You Do Not Want to Face GoldBrute

Those of you who have been interested in the online threat landscape for the last few years probably know what Microsoft's Remote Desktop Protocol (or RDP) is. You've seen it being used in more than a few large-scale... Read more

June 11, 2019
The GandCrab Ransomware Creators Announced Their Retirement, but Poorly Protected MySQL Servers Are Still at Risk screenshot

The GandCrab Ransomware Creators Announced Their Retirement, but Poorly Protected MySQL Servers Are Still at Risk

Shortly after its first appearance in early-2018, GandCrab's popularity grew, and it quickly became the most prominent name on the Ransomware-as-a-Service (RaaS) market. GandCrab's commercial success was so massive,... Read more

June 3, 2019
How to Protect Backups Against Ransomware Attacks screenshot

How to Protect Backups Against Ransomware Attacks

Almost everything we do nowadays gets digitalized for the purpose of easy storage and accessibility. Whether it's a private person's projects stored on their own PC, or a huge list of employees, schedules, goods and... Read more

August 2, 2019
Meet Monokle, an Android Malware Family Capable of Stealing and Changing Passwords screenshot

Meet Monokle, an Android Malware Family Capable of Stealing and Changing Passwords

Special Technology Center (STC) is a software development company based in Saint Petersburg, Russia, and the American Government hasn't been particularly happy with it. In 2016, Barack Obama imposed sanctions on STC... Read more

July 29, 2019
Watch out for the Anubis Banking Malware That Can Put Your Virtual Privacy at Risk screenshot

Watch out for the Anubis Banking Malware That Can Put Your Virtual Privacy at Risk

If you ever find yourself wondering how large a large-scale cybercrime operation can be, you could do worse than take a look at the Anubis Android malware. The trojan has been around for at least five years now, but... Read more

July 10, 2019
Beware of the Houdini Trojan, or You Might Lose Control over Your Online Banking screenshot

Beware of the Houdini Trojan, or You Might Lose Control over Your Online Banking

For as little as $50 per month, wannabe cybercriminals can go on a popular hacking forum and rent what has been advertised as WSH Remote Access Tool (RAT). As we'll find out in a moment, at least some of them seem to... Read more

June 18, 2019
How to Protect Your Password From the Rootkit-Enabled Scranos Malware screenshot

How to Protect Your Password From the Rootkit-Enabled Scranos Malware

Beware, the Scranos rootkit malware, which has been running wild recently, can do serious damage to you by stealing your passwords and user credentials through a fake certificate. However, if you have become the... Read more

June 10, 2019
Are Passwords in Danger When the Hawkeye Keylogger Attacks? screenshot

Are Passwords in Danger When the Hawkeye Keylogger Attacks?

The HawkEye keylogger has been around for about six years now and despite the fact that some would say it has silly name (for a malicious program), it's not just a simple hacking tool developed by a teenage computer... Read more

May 31, 2019
Loading...