Most social media accounts are full of personal information, which is why many of us try to keep them as safe as possible. Unfortunately, cybercriminals are making this task more and more complicated as they come up with new vicious
Continue reading 0 CommentsWorking from Home: COVID-19’s Constellation of Security Challenges
Whether you have been quarantined since February or you have just entered the lockdown several days ago, we are sure that you have been affected by the worldwide COVID-19 pandemic in one way or the other. Quite unexpectedly, we have
Continue reading 0 CommentsThe US Department of Health Is One of Many Institutions Under Attack During the COVID-19 Pandemic
As governments, health departments, testing labs, hospitals, and the entire medical community is trying to get a hold of the vicious COVID-19 virus, also known as the novel coronavirus, cybercriminals are not sleeping on the opportunity to exploit vulnerabilities. Now
Continue reading 0 CommentsGoogle Chrome Users Should Watch out for Cstealer
CStealer is a threat to any Windows user who stores his passwords in the password manager that is provided by Google Chrome. The Trojan can misuse the tool’s password retrieval function to steal your login credentials. Thus, if you are
Continue reading 0 CommentsWatchBog Attacks Linux Servers
When ordinary users think about computer infections, they probably seldom realize that almost anything could be hacked as long as that device is connected to the Internet. So anything from your fridge to a commercial server could be infected. WatchBog
Continue reading 0 CommentsTaking Over a Hackers’ Server Might Provide Proof That Could Link Rising Sun and the Lazarus Group
Researchers suspected that Rising Sun was linked with the Lazarus Group of cybercriminals back in 2018 when it was first discovered. However, more proof of such a link was needed. The missing evidence was obtained in 2019 when authorities handed
Continue reading 0 CommentsPasswords Are Not Safe with CredRaptor in the Wild
Do you value the privacy of your company and the privacy of data that might be very dangerous in the wrong hands? If you do, CredRaptor is the threat that you want to protect yourself and your operating system against.
Continue reading 0 CommentsMarcher: An Android Trojan That Keeps Coming Back
It has been six years since the first version of a Trojan called Marcher has been spotted. Over the years, the hackers kept upgrading it, and new variants were released. The latest version showed up in 2017. It is difficult
Continue reading 0 CommentsHacker Behind 'Jeanson J. Ancheta' Email Scam Uses Sextortion to Make Money
The devious 'Jeanson J. Ancheta' Email Scam was set up by a schemer – or a group of schemers – who want your money, and they are willing to tell you a shocking lie to get it. The truth is,
Continue reading 0 Comments