A recently discovered Android banking Trojan features a bot and command and control panel fully written from scratch, SfyLabs has discovered. Dubbed Red Alert 2.0, the malware has been designed and distributed over the past several months by a new threat actor, the researchers say. The threat features new code but […]
EU to Launch Cybersecurity ‘Safety Labels’
The European Union unveiled plans Tuesday to step up its response to cyber attacks, including a new intelligence-sharing agency, cyber war games and product safety labels. The proposals by the European Commission, the executive arm of the 28-nation bloc, come amid growing concerns over election hacking by foreign states, ransomware […]
How to recognize a targeted malware/phishing attack
I received an email pretending to be from my hoster Strato (known as Cronon AG) telling me that my domain I have for my IT Consulting business has been suspended because of complains they received. This kind of email is called “Spear Phishing”: it targets only certain users that have a proven […]
Ransomware: Prevention is the best solution
Ransomware is malicious software that denies you access to your computer or files until you pay a ransom. There are several types of ransomware that are commonly seen: files/folders encryptors screen ‘lockers‘ MBR ransomware (MBR: master boot record) To read the original article : http://improve-your-security.org/ransomware-prevention-is-the-best-solution/
Set of online resources from AV-Comparatives.org
TOPICS:AV-ComparativesResourcesTips POSTED BY: IMPROVEYOURSECURITY SEPTEMBER 18, 2017 Here is a set of resources put together by AV-Comparatives.org : General guidelines in minimizing risks Online vulnerability starts with human vulnerability E-mail security Web navigation Safe online banking To read the original article : http://improve-your-security.org/set-of-online-resources-from-av-comparatives-org/
CCleaner Malware Incident – What You Need to Know and How to Remove
This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CCleaner coverage. What happened? An unknown threat group compromised the CCleaner infrastructure. The attacker added malware to the CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 installers, but the malware only executed on […]
How Do Hackers Hack Social Networking Websites?
At the point when individuals discuss hacking and social networks, they’re not alluding to the common meaning of hacking, which is utilizing malignant code or secondary passages as a part of machine systems to harm systems or take restrictive data. Hacking into social networks requires almost no specialized ability. It’s […]
OurMine Hackers Hacked VEVO and leaked 3.12TB data online
The infamous hacker group OurMine targeted the popular video hosting service and leaked 3.12TB worth of data online. The hacker group is constantly in news by attacking various popular companies including HBO recently. Now they leaked 3.12TB of data and some of the documents leaked contain very sensitive information according […]
The Fuzzing Project
Optionsbleed – HTTP OPTIONS method can leak Apache’s server memory Posted by Hanno Böck on Monday, September 18. 2017 If you’re using the HTTP protocol in everday Internet use you are usually only using two of its methods: GET and POST. However HTTP has a number of other methods, so I wondered what […]
Chrome will tag FTP sites as “Not secure”
Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome security team has shared. To read the original article : https://www.helpnetsecurity.com/2017/09/15/chrome-ftp-insecure/