Thousands Of Apps In The Play Store Are Trojan Horses
Note: This is a follow-up article of our story regarding Google Play Store that was published earlier. The Data61 team from the University of Sydney and Commonwealth Scientific and Industrial Research Organization (CSIRO) has revealed that Google Play is riddled with malicious cloned apps of the top 10,000 apps. According to Data61 team, they were
[ Read More ]Vulnerability Management In The Nutshell
In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in
[ Read More ]Chrome adds Alert to Warn Users of Deceptive
The latest version of Chrome, released earlier this month, provides deceptive URL protection that redirects users to the right website. Google also introduces an extension for Suspicious Site Reporter for Chrome to send misleading URLs and other malicious pages directly to Safe Browsing. One common way that malicious parties try to outsmart users is confusing
[ Read More ]Data Mining & Collaborative Tool Open Sourced By Google
Google is known for developing software and open sourcing it for the community to use, with its core business continue to revolve about advertising and data-mining. Yes, critics always echo that Google’s “don’t do evil” former motto was just for PR, which got some credit given that the search giant removed (or forgotten) that motto
[ Read More ]Safe Computing Habits In The “Post Ransomware” Era
Ransomware is a type of computer virus was made infamous by WannaCry in 2017. Two years ago millions of victims paid ransom money to its creators just to desperately restore their encrypted files. The “business model” was very successful, WannaCry developers had estimated total revenue of $4 billion that year. Today in 2019, we saw
[ Read More ]Singapore Expects More Data Breaches in the Near Future
Singapore, which saw a drop in common security threats last year, expects to see more data breaches in the near future, says the Cyber Security Agency (CSA). The Cyber Security Agency says that in the near future there would be more frequent data breaches plus disruptive attacks against the cloud, in Singapore. APTs (Advanced Persistent
[ Read More ]How To Secure Our Smart Devices Today?
Smartphones are an indispensable tool for many people, it becomes the most personal computer of all personal computers. The realization of information at your fingertips that Bill Gates was selling way back from the mid-’90s, but only came to the mainstream market in 2007 with the release of Apple’s first iPhone. Although smartphones are now
[ Read More ]Timid Cloud-Infrastructure Adaptation Is A Risky
Today’s use of the cloud infrastructure in the enterprise is advancing and adoption is accelerating, but we still hear opposition to it, with claims that making cloud-computing the centerpiece of the firm’s computing dependence is a huge security concern. On the other hand, it is also true that there is a big advantage such as
[ Read More ]Why Ransomware-as-a-Service GandCrab Is Shutting Down?
GandCrab “Ransomware-as-a-Service” shutting down after a year of operation. This black market service was able to produce $2 billion worth of ransom payments for their customers who purchased the service, infecting the target victims with a customer-customized GandCrab. The Ransomware-as-a-Service is a new profit-model, where the original ransomware author does not infect victims directly but
[ Read More ]Etymology of Adware & How To Fight It
People’s mindshare about the existence of Adware for at least a decade has taken a backseat to more serious malware types like banking trojans, ransomware and cryptocurrency mining malware. However, Adware has a huge effect on how Windows operates, given that programs that illegally display adverts are earning money at the expense of consuming system
[ Read More ]