malware

Online Freelance site Fiverr offers Illegal Private Spying Services

After Motherboard approached the company to comment, Fiverr removed a number of listings. A free-lance Fiverr site allows a company to hire a short-term application developer, logo designer or help with their social media accounts. Fiverr is also a place where you can purchase malware to illegally spy on your wife, pay someone to place

[ Read More ]

All about Malware Trade and it’s Psychological Tricks

As a professional services consultant, I am pleased to meet customers around the world and talk to a wide range of IT security experts who are at the forefront of malware defence. One of my favorite topics is how people have started their IT careers, but I am frequently surprised by the number of people

[ Read More ]

Common Ways For Countering Privileged Identity Theft Attacks

Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are

[ Read More ]

Artificial Intelligence: Ally Or Enemy Of System Security?

The term “artificial intelligence” is now a keyword that has attracted a great deal of attention in the technological development of various fields. Image recognition, speech analysis, human interaction, medical use, surveillance camera security and economic analysis have an innovative impact on data management in the current day when data handling is commonplace. The existence

[ Read More ]

Watering Hole Attacks Target Chinese-Speaking People Outside Of China

Compared to the classical phishing and social engineering attacks, the term watering hole attack is seldom given any attention by cybersecurity websites. It is a coverage something we need to amend, as contrary to the popular notion that such a campaign is very rare. It is a common occurrence but received less coverage than more

[ Read More ]

Monzo Internal Data Breach Incident: Update App and Change PIN

Mobile-only bank, Monzo is the latest victim of a data breach, with the UK-based bank requesting their customers to change their PIN (Personal Identification Number). Upon initial inspection, the bank determined that the customers’ account PIN were recorded into log files which then were made accessible by their own staff. Monzo opened a blog entry

[ Read More ]

Microsoft and Its Desire To Secure Global IoT Devices

The Microsoft Security Research and Defense (MSRD) team has issued a cybersecurity warning about the growing concerns of IoT (Internet-of-Things) security, especially botnet infections in their official blog. Redmond highlighted that IoT devices is forecasted to grow as much as 50-billion installations globally, with many devices having identified with security and privacy flaws fresh from

[ Read More ]

More Fierce Ransomware Still On Horizon, Corporate Victims To Increase

IBM’s X-Force Incident Response and Intelligence Services (also known as IRIS) has issued a report, detailing the growth of destructive malware that infected the corporate space. The cybersecurity arm of Big Blue has disclosed that 12,316 corporate Internet-connected devices were rendered offline, costing $239 million to replace and reconfigure in an average malware attack for

[ Read More ]

Fundamental Things You Need To Know About Ransomware

This article is written for the purpose of empowering our readers with much deeper knowledge of ransomware, with the goal of lessening the chance that your Windows computer will be the next victim. Ransomware is a type of malware that ranks high on the Internet as cybercriminal’s favorite milking-cow. A computer infected with this virus

[ Read More ]

ViceLeaker, An Android Large-Scale Espionage Malware

It took 3-years of cat and mouse play, Kaspersky was successful with its background checks against the nature of an Android malware named ViceLeaker. Unlike a general malware type that infects random vulnerable Android device, ViceLeaker is apparently designed to infect users from Middle East countries, for the purpose of large-scale espionage operations. The malware

[ Read More ]