Spyware can be called the most sophisticated malware these days. It never acts openly, uses tricky techniques, and appears more often with other viruses. Together with its brother-in-law – stealer malware – spyware helps the cyber criminals to find and exfiltrate the data from attacked corporations. Moreover, ransomware that aims at individuals (exactly, STOP/Djvu family)… Continue reading The 5 Most Famous Spyware Attacks
Author: Stephanie Adlam
I write about how to make your Internet browsing comfortable and safe. The modern digital world is worth being a part of, and I want to show you how to do it properly.
Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption
Not a long time ago, a cybersecurity analyst posted a video on YouTube where he shows the vulnerability in ransomware samples used by well-known ransomware groups. In the footage, expertly shows this exploit usage on the REvil ransomware sample, but there are half a dozen of ransomware products vulnerable to that thing. The crooks’ weapon… Continue reading Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption
Yahoo Search: How to Remove Yahoo from Chrome?
Yahoo Search is a legitimate search engine that exists for over 25 years. When chosen by desire, it offers all the basic functions of any search engine. However, there are certain situations when Yahoo search appears in your Chrome browser without your wish. In this article, I will show you how to remove Yahoo Search… Continue reading Yahoo Search: How to Remove Yahoo from Chrome?
Can Malware Spread Through a Shared Wi-Fi Connection?
It is hard to imagine the modern world without wireless connections. Wi-Fi routers and Bluetooth devices have become a part of our everyday life. And yet, not more than fifteen years ago, the technology was not that widespread, and we still used local network wires most of the time. Public Wi-Fi hotspots were hard to… Continue reading Can Malware Spread Through a Shared Wi-Fi Connection?
A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices
A vulnerability has been discovered (CVE not yet issued) in uClibc and uClibc-ng C standard libraries. These libraries are vastly used in IoT devices. The newly found vulnerability makes it possible to place forged data into the DNS cache, allowing to set an arbitrary IP address in that cache with the subsequent rerouting of all… Continue reading A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices
What is Scareware and How Not to Buy Into It?
Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus on a machine and persuades users to purchase fake security software. Here we’ll regard how this spoof works and how not to get fooled by… Continue reading What is Scareware and How Not to Buy Into It?
F5 warns of critical BIG-IP RCE vulnerability
F5, Inc warned the users about the critical vulnerability that harms the iControl REST users. That solution is a framework offered by the F5 Corporation as an advanced tool for software developers. The detected flaw is noted as critical, since it makes the device takeover possible for non-authorised users. F5 warns its customers of a… Continue reading F5 warns of critical BIG-IP RCE vulnerability
Experts analysed the conversations of Conti and Hive ransomware groups
Analysis of more than 40 chats with victims allowed the specialists to figure out some interesting details about the internal structure and the style of negotiation. Conti and Hive ransomware groups were very active over the last quarter, and the number of their victims grew pretty hard. About Conti and Hive ransomware groups Those two… Continue reading Experts analysed the conversations of Conti and Hive ransomware groups
What is a Smurf Attack? How Does It Work?
Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most sophisticated types of denial attacks. Let’s check how that works, and figure out how to mirror that attack as well as decrease the chances to… Continue reading What is a Smurf Attack? How Does It Work?
What is Typosquatting: How Does It Work in 2022?
There is a special trap on the Internet for people, who type the website address into the browser’s address bar, instead of using search. Yes, few people do so in the times of auto-fill, but there are still some romantic souls out there. The trap is called typosquatting, and you can guess what it means… Continue reading What is Typosquatting: How Does It Work in 2022?