News, Tips, Security Lab
Facebook Fraud: Other Dangerous Facebook Scams (Part #2 by Gridinsoft)
Facebook is probably one of the most popular platforms for online communications. For that reason, it is also a favorite…
Android Malware. Is Malware on Android Phone Possible?
Android malware is a common name for all malicious software present in Android. This OS appears not only on phones…
New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm
Information security experts warned of an increase in the number of infections with the new version of TrueBot, primarily targeting…
How Not to Stumble on Scam Websites
Every year, one in ten Americans will be victimized by a scam or fraud. The variety of online fraud has…
Hackers Stole over $2.5 million from Hackers
In the past 12 months hackers have scammed more than $2.5 million from other cybercriminals on three separate hack forums…
New Internet Protocol ODoH will hide websites visited by users from ISPs
Engineers at Cloudflare and Apple have created a new internet protocol, ODoH, to fill one of the biggest internet security gaps many people don’t even know existed. The protocol named…
PlayStation Now bug allowed execution of arbitrary code on Windows
A critical bug that has been fixed in the PlayStation Now app for Windows could be used by malicious sites to execute arbitrary code. Let me remind you that this…
Hackers hide MageCart skimmers in social media buttons
Sanguine Security analysts discovered that hackers are using steganography and hiding MageCart skimmers in buttons designed to post content to social media. Let me remind you that initially the name…
Ransomware – Facts at The Edge of 2022
It is hard to imagine something more harmful than ransomware. Besides the danger for your files and PC, it also deals a significant damage to quite a material thing -…
5G and it’s possible effect on our lives
5G networks are declared as an amazing technology that can allow us to use different options of ultra high speed connection. The biggest 5G network in the world is located…
About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library
Check Point experts warned that developers of many popular Android applications forgot to make an important update and now their product is vulnerable to a bug in the Play Core…
Cybersecurity expert created an exploit to hack iPhone via Wi-Fi
Google Project Zero expert Ian Beer has demonstrated an exploit to hack iPhone and other iOS devices remotely and without user interaction. The underlying critical vulnerability CVE-2020-3843, discovered by the…
Operators of phishing campaigns increased number of emails allegedly from delivery services
Check Point Research reports that in November, the number of phishing emails written on behalf of delivery services increased by 440% compared to October. The sharpest growth was noted in…
Linus Torvalds doubts that Linux will run on Apple M1
Recently on the Real World Technologies forum Linus Torvalds was asked what he thinks of Apple’s new M1 laptops. Torvalds then vague replied, “I would love to have this [laptop]…
Apocalypse Now: experts presented a new type of cyber-biological attack
On Monday, November 30, specialists from the Ben-Gurion University of Negev (Israel) presented a new type of cyber-biological attack that can bring biological warfare to a new level. The attack,…
Hackers create scam e-commerce sites over hacked WordPress sites
Akamai specialist Larry Cashdollar discovered a hacker group that uses hacked WordPress sites in an interesting way. First, hackers run fraudulent online stores over WordPress sites. Second, they poison XML…
Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008
French cybersecurity researcher Clément Labro was working on a security tool when he discovered that Windows 7 and Windows Server 2008 R2 were vulnerable to a 0-day local privilege escalation…