malware

Malicious Malware Now Found Lurking In The Google Play Store

Palo Alto Networks, a network enterprise security firm, has now discovered at least 145 apps in the Google Play Store are embedded with Windows-based malware. These apps remain functional when installed in an Android device, and their Windows executable malware does not run in the Android ART environment. However, experts predict certain Android app developers

[ Read More ]

Must-Know Tips On How To Protect Your Bitcoin Wallet

Recent reports claimed that Rakhni, a ransomware strain, has developed a new coinminer component that allows it to sneak into the funds of Bitcoin users. Rakhni is said to have the ability to lurk around a targeted computer before inflicting an attack. It then can either infect a computer right after sneaking in or run

[ Read More ]

Ransomware Dethroned As Cryptomining Virus Takes The Lead

The time of ransomware at the top of the malware food chain is over, statistics from Kaspersky shows that there was a massive increase in incidents of ransomware infection in 2016. As per their findings: “The total number of users who encountered ransomware fell by almost 30%, from 2,581,026 in 2016-2017 to 1,811,937 in 2017-2018.

[ Read More ]

How The 2019 WannaCry Scam Evolved Into Straight Up Extortion

May 12, 2017, will always be remembered by the corporate world, especially the healthcare industry as a date when a new cyber-extortion racket, the WannaCry malware was unleashed and no cybersecurity software was able to anticipate it. It took advantage of a flaw in Server Message Blocks (SMB) version 1.0 to penetrate an otherwise security-hardened

[ Read More ]

Here’s The Right Mindset Against Ransomware

Businesses of all sizes have been investing in security software and fundamental cybersecurity infrastructure for decades. The antivirus industry has grown into a huge industry on its own from its humble beginnings of just being a small utility a user can optionally be bought and came with a floppy disk media. In fact, the very

[ Read More ]

What’s All The Fuss About Protecting Your Private Data?

With over 4 billion users, no one can deny that we’re now living in the golden age of the Internet. We use the internet to get information, interact with other users, manage our bank accounts, and so on. But with the continuously rising volume of internet usage comes the increasing number of online attacks. What’s

[ Read More ]

Bank Trojans On The Rise According To Cybersecurity Report

Cybercriminals are now targeting higher value victims than ransomware can ever net them. According to enterprise security provider named Proofpoint in their recently released 2018 Q1 Quarterly Threat Report, banking Trojans have infected more computers than ransomware for the same period last year. Banking Trojans are credential stealing malware that targets online banking depositors using

[ Read More ]

How To Defend Yourself From New Cryptocurrency Malware

New malware have been discovered in the cryptocurrency world. Based from a blog post by Radware, reports about a discovery by cybersecurity researchers. Cybercriminals are able to abuse a Chrome plugin named “Nigelify” with a malware code in order to steal personal information and secretly mine cryptocurrency. The Chrome extension is able to bypass Google’s

[ Read More ]

Experts Say Yes, Ransomware Is Still A Top Cybersecurity Threat

Ransomware still seems to be the most prominent malware around, as per a recent study report. The Verizon Annual Data Breach Investigation Report, released last week, comprises this and some other relevant findings. This is the eleventh edition of the Verizon Data Breach Investigation Report (DBIR) and this includes data from 67 contributing organizations; the

[ Read More ]

Hackers Love The EternalBlue Exploit Because You Hate It

There is one thing small-time hackers and heavy-hitting black hats have in common—they both love the exploit known as EternalBlue. Evolved from the famous computer worms Conficker and Welchia, EternalBlue employs diverse exploits with new, brilliant-devised, and easy to deploy applications. As a hacker favorite, it leaves digital devastation in its wake while taking advantage of any unpatched

[ Read More ]