News, Tips, Security Lab

Security Breach Explanation & Definition

Security Breach

A security breach is an unauthorized access to a device, network, program, or data. Security breaches result from the network…

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop…

Fake Virus Alert Removal Guide

Fake virus warnings are a nuisance; if you’re not careful, they can lead to a real malware injection. Hackers create…

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began…

How to Remove Windows Defender Security Warning Scam

Have you ever had a Windows Defender security warning pop up randomly while browsing? This type of malicious activity wants…

Hackers hide MageCart skimmers

Hackers hide MageCart skimmers in social media buttons

Sanguine Security analysts discovered that hackers are using steganography and hiding MageCart skimmers in buttons designed to post content to social media. Let me remind you that initially the name…

Ransomware - facts at the edge of 2021

Ransomware – Facts at The Edge of 2022

It is hard to imagine something more harmful than ransomware. Besides the danger for your files and PC, it also deals a significant damage to quite a material thing -…

5G and it’s possible effect on our lives

5G and it’s possible effect on our lives

5G networks are declared as an amazing technology that can allow us to use different options of ultra high speed connection. The biggest 5G network in the world is located…

bug in the Play Core library

About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library

Check Point experts warned that developers of many popular Android applications forgot to make an important update and now their product is vulnerable to a bug in the Play Core…

iPhone hack exploit

Cybersecurity expert created an exploit to hack iPhone via Wi-Fi

Google Project Zero expert Ian Beer has demonstrated an exploit to hack iPhone and other iOS devices remotely and without user interaction. The underlying critical vulnerability CVE-2020-3843, discovered by the…

phishing emails from delivery services

Operators of phishing campaigns increased number of emails allegedly from delivery services

Check Point Research reports that in November, the number of phishing emails written on behalf of delivery services increased by 440% compared to October. The sharpest growth was noted in…

Linus Torvalds and Apple M1

Linus Torvalds doubts that Linux will run on Apple M1

Recently on the Real World Technologies forum Linus Torvalds was asked what he thinks of Apple’s new M1 laptops. Torvalds then vague replied, “I would love to have this [laptop]…

A new type of cyber-biological attack

Apocalypse Now: experts presented a new type of cyber-biological attack

On Monday, November 30, specialists from the Ben-Gurion University of Negev (Israel) presented a new type of cyber-biological attack that can bring biological warfare to a new level. The attack,…

e-commerce sites over WordPress sites

Hackers create scam e-commerce sites over hacked WordPress sites

Akamai specialist Larry Cashdollar discovered a hacker group that uses hacked WordPress sites in an interesting way. First, hackers run fraudulent online stores over WordPress sites. Second, they poison XML…

0-day bug in Windows 7

Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008

French cybersecurity researcher Clément Labro was working on a security tool when he discovered that Windows 7 and Windows Server 2008 R2 were vulnerable to a 0-day local privilege escalation…

NATO experimented with deceptive techniques

NATO experimented with deceptive techniques to combat Russian hackers

During a cyber exercise in Estonia on November 16-20, NATO experts experimented with deceptive techniques – they practiced in catching Russian government-funded hackers using specially placed traps. The exercise, coordinated…

How to steal a Tesla Model X

The researcher showed how to steal a Tesla Model X in a few minutes

Information security specialist Lennert Wouters from the Catholic University of Leuven showed how to steal a Tesla Model X. He discovered a bug that allowed hacking and changing the firmware…