5 Likely Cybersecurity Trends For The Rest Of 2019
What are we expecting from the world of cybersecurity, as we enter its second quarter of 2019? In order to predict whatever theoretical or reasonable trajectory that we will experience for the rest of the year, let us review happened in 2018 and discuss the trend of 2018 as a guide for this year based
[ Read More ]Know More About The Bitcoin Core Fake Wallet
As Bitcoin matures and other cryptocurrency alternatives emerge, the growth of interest with cryptocurrency wallet and cryptocurrency node also comes into effect. At the time of this writing, 1 BTC is around $3,960, though huge for an average Joe, it used to be as high $19,783.21 on Dec 17, 2017. Bitcoin Core, the free software bitcoin
[ Read More ]LokiBot, The Android Malware Problem Since 2016
LokiBot is silently causing harm to Android devices that it has infected without user knowledge since 2016. It is a trojan designed to steal information from the user, an espionage-like software causing users to lose their login credentials for various web services. The people behind it are very motivated, given that they continue to “improve”
[ Read More ]The Corporate Risks Of Allowing Undocumented Devices
Accessibility and commoditization of computing devices brought both advantages and disadvantages for the public. The smart devices became much more affordable, while manufacturers are motivated to release new devices faster than the market can actually afford. Enterprises are very much affected by these dynamics, given that they have allowed BYOD (Bring Your Own Devices) within
[ Read More ]BTC vs BCH or BSV, Which Is The Best Successor To Bitcoin?
Bitcoin (BTC) has been with us since January 3, 2019, and since then the blockchain cryptocurrency that started the craze has become a very difficult mine. Those that came early to support BTC is slowly but surely migrating to other cryptocurrency. One of them is Kevin Pham, a long time voice in the promotion of
[ Read More ]Hacking Preventive Ways To Keep Gnosticplayers at Bay
Hackergroup Gnosticplayers had done it again, their recent successful campaigns against 8 websites, namely: Strong Kingdoms, petflow, YouNow, Houzz, Roll20, ixigo, and Ge.tt. These attacks created a huge supply of user credentials that are now available for sale in the Dark Web. At a recent estimate, around 126 million accounts are being offered to Dark
[ Read More ]Penetration Testing Tool Yuki-Chan for Threat Protection
We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses
[ Read More ]About Monero Malware Troajn Win32.Fysna and its infection
Since cryptojacking malware came into the scene, its favorite cryptocurrency to mine at the expense of its victims is Monero. This is due to the simplicity of mining XMR compared to Bitcoin (BTC), where stolen GPU and CPU cycles can be used for resolving hashes. Recently, Check Point has once again discovered the growing number
[ Read More ]Facebook Blocks 1.2 Million Videos About The NZ’s Mosque Terror Attack
The recent attacks against mosques in Christchurch, New Zealand captures the attention of the world. Copies of the video footage of the actual event were spreading like wildfire in social media. The terrorists themselves launched a live video of the shooting incident that killed at least 50 people from two mosques. According to the New
[ Read More ]Beijing Internal Network Also A Victim Of Ransomware
Beijing is the favorite whipping boy of the Western powers when it comes to being accused of abusing its citizens, causing harm for the rest of the world through its espionage campaigns and maintaining its own army of blackhat elite hackers. However, the reality is China is as vulnerable a country to typical cyber attacks
[ Read More ]