News, Tips, Security Lab

What Is a Security Breach? How to Protect Yourself

What Is a Security Breach? How to Protect Yourself

A security breach is an unauthorized access to a device, network, program, or data. Security breaches result from the network…

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop…

Fake Virus Alert: How Do I Get Rid of Fake Virus Warnings

Fake virus warnings are a nuisance; if you’re not careful, they can lead to a real malware injection. Hackers create…

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began…

How to Remove Windows Defender Security Warning Scam

Have you ever had a Windows Defender security warning pop up randomly while browsing? This type of malicious activity wants…

Huge Ransomware List by Gridinsoft Research – Part #1

Huge Ransomware List by Gridinsoft Research – Part #1

Ransomware is rightfully considered one of the most dangerous types of malware. It attacks individuals and companies, creating a mess in their files and paralysing their work. And even being…

Top Amazon Scams to Avoid: Be Safe at Amazon

Top Amazon Scams to Avoid: Be Safe at Amazon

Because of its reliability, Amazon is a popular choice for both buyers and sellers. But fraudsters frequently turn to the eCommerce market to scam others. In addition, false threats expose…

I Got Scammed on Ebay by Seller”: Avoid Ebay Scams

I Got Scammed on Ebay by Seller”: Avoid Ebay Scams

While online marketplaces like eBay, Facebook Marketplace, and Craigslist are great resources for finding successful deals or hard-to-find items, they also attract scammers and fraudsters. Unfortunately, the most insidious criminals…

GoTrim Malware Hacks WordPress Sites

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in Go that scans the Internet for WordPress sites and brute-forces them by guessing the administrator password. Such attacks can lead…

Facebook Fraud: Other Dangerous Facebook Scams (Part #2 by Gridinsoft)

Facebook Fraud: Other Dangerous Facebook Scams (Part #2 by Gridinsoft)

Facebook is probably one of the most popular platforms for online communications. For that reason, it is also a favorite place for scammers. According to a survey of 1,005 adult…

Android Malware. Is Malware on Android Phone Possible?

Android Malware. Is Malware on Android Phone Possible?

Android malware is a common name for all malicious software present in Android. This OS appears not only on phones but also on a vast majority of IoT devices. Things…

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting users from Mexico, Brazil, Pakistan and the United States. According…

How Not to Stumble on Scam Websites

How Not to Stumble on Scam Websites

Every year, one in ten Americans will be victimized by a scam or fraud. The variety of online fraud has increased with the number of websites and technological advancements. It…

Hackers Stole over $2.5 million from Hackers

Hackers Stole over $2.5 million from Hackers

In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums alone (Exploit, XSS and BreachForums), according to Sophos researchers. You…