News, Tips, Security Lab

Drinker App – what is Drinker Adware?

Drinker App – what is Drinker Adware?

The Drinker app is another example of a malicious program that disguises itself as a useful utility for your PC.…

Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows…

10 Reasons to Choose GridinSoft Trojan Killer

We used to think of anti-malware software as a program that features all kinds of supplementary services. VPN plan, disk…

Healthy App (HealthySoftware) – What is Healthy?

Healthy App seems to be the companion of the other unwanted app – Strength Adware. The dubious application gets into…

Reverse Proxy vs Proxy

What is a Reverse Proxy? A reverse proxy is the same server but is in front of a web server.…

Can Someone Track My Device When Location Settings Off?

Can Someone Track My Device When Location Settings Off?

Any smartphone already has built-in location tracking services. At the beginning location tracking was created for navigation, but it was later used for other purposes. This feature is very convenient…

How To Know If Your Phone is Hacked?

How To Know If Your Phone is Hacked?

If your phone stopped working correctly and started showing obvious performance errors, then something is wrong. If you notice that your smartphone has begun to turn itself off or on,…

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Avast has discovered that DevilsTongue spyware, created by Israeli company Candiru, exploited a 0-day vulnerability in Google Chrome to spy on journalists and others in the Middle East. The vulnerability…

Candiru Malware Uses 0-day Vulnerability In Chrome

Candiru Malware Uses 0-day Vulnerability In Chrome

Following Microsoft, Google and Citizen Lab, another revelation came from Avast researchers. They discovered that the Israeli spyware Candiru used a 0-day vulnerability in Google Chrome. Their main target was…

Spam Phone Calls Revenge

Spam Phone Calls Revenge

Statistics show that an average of 1,900 spam calls are made every second. Given recent statistics about it, it is clear that it is another problem on the head of…

Fraudsters Are Running a Malicious Advertising Campaign through Google Search

Fraudsters Are Running a Malicious Advertising Campaign through Google Search

Malwarebytes, an information security company, has discovered a large malicious campaign that skillfully uses ads and Google search. A phishing campaign using Windows tech support is spreading through Google Ads.…

How to Stop Spam Texts: Tips to Deal With Fake Text Message

How to Stop Spam Texts: Tips to Deal With Fake Text Message

The spam texts can include spam emails and spam calls. These are all unwanted and often annoying text messages whose sender you don’t know. The purpose of such spam is…

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Google Threat Analysis Group (TAG) specialists reported that the Russian-speaking group Turla (aka Waterbug and Venomous Bear) created a fake Android application, allegedly designed to carry out DDoS attacks and…

CloudMensis Malware Attacks MacOS Users

CloudMensis Malware Attacks MacOS Users

ESET experts have discovered the CloudMensis malware, which is used to create backdoors on devices running macOS and subsequently steal information. The malware received its name due to the fact…