News, Tips, Security Lab
Exim Vulnerability Allows RCE, No Patches Available
Exim Internet Mailer, a program massively used as a basis for mailing servers, appears to have a remote code execution…
Redline and Vidar Stealers Switch to Ransomware Delivery
Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same…
TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams
Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam videos spread across the platform. Mostly, these scams…
GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner
As a part of the GridinSoft team, I am proud to announce the public release of our own online virus…
What are Whaling Phishing Attacks?
Malicious actors know executives and high-level employees, such as public spokespersons, are familiar with common spam tactics. Due to their…
This Message Seems Dangerous – Fix Gmail
“This Message Seems Dangerous” problem is common among people using SaasS services or monitoring applications. There are several reasons why Gmail messages display this banner both in your Inbox and…
Experts Demonstrate Data Extraction Using LEDs and a Gyroscope
This week, researchers have demonstrated two interesting ways to extract data from machines that are physically isolated from any networks and potentially dangerous peripherals at once. The GAIROSCOPE method suggests…
iOS VPN Bug Prevents Encryption of Traffic for Years, Researchers Say
A few years ago, engineers at Proton Technologies, the company behind ProtonMail and ProtonVPN, talked about a bug in iOS 13.3.1 that prevents VPN apps from encryption of all traffic.…
Remote working tips: Key Aspects of Secure Remote Access
After the pandemic, work-from-home jobs became much more common around the world. Many predict that even after the pandemic subsides, remote work will remain prevalent in many sectors. On the…
NetSupport and RaccoonStealer malware spreads masked as Cloudflare warnings
Unknown attackers hacked WordPress sites to send fake DDoS protection notifications supposedly coming from Cloudflare and through such fakes, the attackers users with NetSupport RAT and the RaccoonStealer infostealer (aka…
Researchers Found 35 Malware on Google Play, Overall Installed 2,000,000 Times
Bitdefender experts found 35 malware in the Google Play Store that distributed unwanted ads, and which users in total downloaded more than 2,000,000 times. Let me remind you that we…
Janet Jackson Song Killed Hard Drives on Old Laptops
Microsoft specialist Raymond Chen shared an interesting story from the Windows XP era on the blog: the music video for Janet Jackson’s “Rhythm Nation” negatively affects some 5400 rpm hard…
How to Browse the Web Securely: Stay Safe Online
Web browsers are invaluable tools for users and make up a huge portion of the daily time we spend in the digital world. Unfortunately, they hold many personal files and…
Critical Bug in Google Titan M Chip Netted Researchers $75,000
Quarkslab researchers published details of a critical bug they found in the Google Titan M chip earlier this year. Let me remind you that the Titan M, released in 2018,…
Disrupting SEABORGIUM’s Ongoing Phishing Operations
Microsoft Threat Intelligence Center (MSTIC) experts announce the disruption of an operation conducted by the Russian-speaking hacking group SEABORGIUM, targeting individuals and organizations in NATO countries. As a reminder, we…
Signs You’re Dealing With an Online Scam
According to statistics, 1 of 10 Americans are exposed to online scam. Whether you are a dating site user or just a Facebook visitor from time to time, you are…
8 Top Internet Safety Rules: Cybersecurity Tips
There is a lot of entertainment available online, along with education and social media. However, not everyone understands how the Internet works,and knows something about methods of safe usage. This…