Posted on March 9, 2018 by Admin
When browsing on the Internet most people realize that there are potential risks. For example, a malicious website may attempt to install malware on your computer. In other cases, a malicious website may attempt to trick you into providing confidential information by impersonating another legitimate website. There have even been cases were valid websites have been hijacked and used to pass malicious code to unsuspecting visitors. Whatever the case may be, ultimately the attacks were focused
Posted on February 21, 2018 by Admin
When going to websites on the Internet, most of us don’t think much about it or what it’s doing in the background. However, there are a lot of nefarious things that can be happening and sometimes all it takes is for you to land on a page, even for a split second for something bad to happen. Unfortunately, browsing at the office has become more of a risk lately due to various factors arising from the cybercriminal world.
Until recently, security certificates (SSL certificates) were indicators
Posted on February 15, 2018 by Admin
2016 was a banner year for hackers successfully targeting businesses worldwide. And 2017 is set to overtake it for first place, if you believe the Identity Theft Resource Center. Company CEOs are increasingly under fire for dropping the ball on adequate cybersecurity. Huge hacks or small ones, it’s consumers who ultimately pay the price. Just having a bank account or credit card puts consumers in a situation they have no control over. Time and again, countless hacks from Equifax to Uber
Posted on February 15, 2018 by Admin
A startling increase in phishing scams that specifically target retailers, financial institutions, and online payment systems, was reported by Kaspersky Labs for last year. The study tracked phishing from the end of 2016 to mid-October 2017 from everywhere in the world where they have customers. It found that in 2017, the total number of phishing attacks overall using online payments was 15.31%. Compared to 7.08% in 2015, that’s an increase of 34.33%. Quite a change, so what gives?
Posted on February 6, 2018 by Admin
The results are in from the Nokia 2017 Threat Intelligence Report and Android users are not going to be happy. The report is based on results from Nokia’s NetGuard, monitoring network traffic on over 100 million devices around the world. The report finds that Android malware has increased more than 53% since the company’s findings last year. Android mobile devices account for 68% of all malware attacks. Despite efforts by Google to reduce malware attacks with Google Play Protect, the report
Posted on January 25, 2018 by Admin
Nyoogle. Stickies. Lite Bookmarks. They all sound like they could be some fun browser extensions to add onto your version of Chrome. Well, they aren’t, although 500,000 people downloaded them. Researchers at ICEBRG found that those and another called HTTP Request Header are likely being used in a click fraud scam. It was discovered that those extensions were visiting advertising-related web links, resulting in a neat little payday for fraudsters. But that’s not all that add-ons and
Posted on January 16, 2018 by Admin
The Internet has become a way of life for most of us. While it might be a breath of fresh air to be “off the grid” for a period of time to rest and reset, it really is difficult to think of not having it available to us at the touch of an app. Because of this, cybercriminals are also finding ways to use it to scam us out of any number of things including to steal our information, to make money or steal it, or even just to cause a disruption in our day.
Last year, there were a reported 6.2
Posted on January 10, 2018 by Admin
Twenty million or more homes now entertain a smart-speaker sidekick. Speaking to devices isn’t new, just ask Alexander Graham Bell. But with technology constantly building on top of itself, these little household helpers are now leading the way. With all of their novelty and support, there is a flipside of voice-activation. From casual users to strung-out parents (who kiss the counter it sits on), there are several areas of concern.
Although the devices are trained to recognize the voices of
Posted on January 8, 2018 by Admin
Researchers at Palo Alto Networks have discovered some malicious files that have links to those that targeted the Saudi Arabian government earlier this year. They also seem to resemble some attacks on other countries in the Middle East, as well as some countries not in the area, including the United States and India. Researchers are referring to this series of attacks, which has been ongoing since February of this year, as MuddyWater. That’s because the whole thing is kind of "muddy.'
Posted on December 21, 2017 by Admin
It isn’t the first time we’ve heard of malware that can be used in a modular fashion to wreak havoc on devices. Kaspersky Lab researchers have found a version of malware that will download a cryptocurrency miner that will overload the components of Android phones and essentially destroy them. Loapi, as it’s being called is yet another evolution of malware, like GozNym before it that uses a component structure to do what it wants to do. This one is a newer version of one found in 2015. It will