cybercriminals

Formjacking is Getting Popular Among CyberCriminals

Formjacking is emerging to be one of the most favorite methods of hacking among cybercriminals across the globe. Formjacking is the hacking technique in which cybercriminals target retail websites with a malicious code that helps them in snatching customers’ credit card information. Thousands of websites are targeted every month in this manner and this kind

[ Read More ]

New Malicious Windows EXE Files Targeting Mac Detected

This might seem a bit odd, but it’s a fact- new malicious Windows .exe that target macOS computers have been detected. Security researchers at Trend Micro have discovered malicious Windows EXE files (which are supposed to run only on Windows platforms) that could bypass Mac’s security mechanisms and deliver malware on MacOS systems. A Trend

[ Read More ]

How to Secure Your ACS (Access Control System)

We live in a world where cybercrime has become a very common thing. Cybercriminals, who are turning more and more sophisticated with evolving technology, are always on the lookout for security holes that they can exploit to access systems, devices and networks to steal all kinds of data, ranging from corporate data to sensitive personal

[ Read More ]

Chinese Scammers Use Social Engineering to Swindle $18.6M

Fraud transaction through clever social engineering enabled Chinese phishers in successfully swindling an estimated $18.6 million from Tecnimont SpA’s Indian branch. With a cleverly written email that heavily resembles Pierrorberto Folgiero’s (the company’s Group CEO) was sent to Tecnimont Pvt Ltd, the phishers were able to persuade decision makers in the company’s India office to

[ Read More ]

Be Thankful You Weren’t At The ATM When This Happened

Cybercriminals are at it again, and this time they’re hanging out at the ATM. But they’re not stealing from anyone’s bank account directly, just removing all the money the machine is holding. Many ATMs can access up to $20,000 or more in cash, so it’s possible for cyber attackers to grab a lot of dough,

[ Read More ]

Really, How Safe Is The Camera On Your Device?

These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social

[ Read More ]

Why All the “Not Secure” Websites These Days?

Have you noticed a sudden rash of websites flagged as “not secure?” Every browser does it a little differently, but all the latest versions of the big four (Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari) warn users about unsecured websites. Since July, Chrome has started to mark every website as either “secure” or

[ Read More ]

Is The Department Of Labor Exposing Your Employee Benefits To Attack?

In the U.S. and Canada, the first Monday of September is dedicated to Labor Day, a public holiday established to honor the social and economic achievements of hard working Americans throughout history. According to the U.S. Department of Labor (DOL), the event recognizes how the average employee has directly contributed to the current strength and prosperity

[ Read More ]

Warning To All Executives: This Security Breach Is On You!

Turn out, 2017 was a crazy year for data breaches. No one can forget the massive Equifax disaster, which exposed the sensitive information of millions of customers to cybercriminals around the world. And of course, there was the attack on the Republican National Committee which leaked personal data of over 200 million American voters. Oh,

[ Read More ]

Here Is A Surprising Look At Smart City-Based Vulnerabilities

Not only has the 21st century introduced a whole new way thinking about the world, it has forced people living in big cities to change their collective mindset. The rise of “smart cities,” complete with their various types of electronic data collection sensors and information-gathering resources, has dramatically altered the attack vector on the people

[ Read More ]