G DATA’s specialists have published a report on the new T-RAT malware, which is being distributed for only $45. The main feature of the malware is that T-RAT allows controlling infected systems through the Telegram channel, and not through the web administration panel, as it is usually done. Malware creators claim that this provides faster… Continue reading New T-RAT malware can be controlled via Telegram
Tag: Malware
Alien malware steals passwords from 226 Android apps
ThreatFabric analysts have discovered a new Android malware Alien. The malware primarily targets banking applications. Overall, Alien steals passwords and other credentials from 226 apps. Alien is sold on hacker forums under the MaaS scheme (Malware-as-a-Service). At the same time, the malware was not developed from scratch, it is based on the source codes of… Continue reading Alien malware steals passwords from 226 Android apps
KryptoCibule malware steals cryptocurrency from Windows users
ESET specialists discovered the KryptoCibule malware, which has been active since 2018 and steals cryptocurrency from Windows users in the Czech Republic and Slovakia (these countries accounted for 85% of infections). KryptoCibule has three main functions and is capable of: installing cryptocurrency miners on victims’ systems (CPU and GPU miners are used to mine Monero… Continue reading KryptoCibule malware steals cryptocurrency from Windows users
Shlayer malware bypassed Apple security checks
Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple’s checks: it successfully passed the software notarization process and could run on any Mac running macOS Catalina and newer. In February of this year, Apple introduced a new security mechanism: any Mac software distributed outside the App Store must go through a notarization process… Continue reading Shlayer malware bypassed Apple security checks
How To Use Public Wi-Fi Safely: Risks To Watch Out For
In a world where almost everything comes with a price it’s sometimes nice to have at least free wifi. But starting with such a poetic intro here actually comes the real concern: how to use Wi-Fi for free and keep your data private. Many people don’t realize it but using public Wi-Fi puts you at… Continue reading How To Use Public Wi-Fi Safely: Risks To Watch Out For
How To Fix a Computer That Randomly Restarts
Modern computers have working stability much higher than the stability of the computers in the late ‘90s – early ‘00s. Nonetheless, nasty bugs sometimes make us frenzy, because they make the working process problematic. Besides the BSODs and malicious software, there is a thing that is much harder to understand – constant PC rebooting. Be… Continue reading How To Fix a Computer That Randomly Restarts
Reasons to Start Cleaning Your PC Right Now
We may sometimes forget that our little friends aka computers also need some refreshment as well. Under refreshment, it is meant to thoroughly clean both hardware and software because they also often get dirty literally and metaphorically. But so far we will present you with reasons to clean your software because it’s the mind and… Continue reading Reasons to Start Cleaning Your PC Right Now
Risks Downloading Leaked Operating Systems
We do hear about OS leaks of any type very often and we are always eager to download this leak to upgrade the present and enjoy the new features in this new OS as seens and expected when it was announced. But there has always been this question of, is it safe or secure to… Continue reading Risks Downloading Leaked Operating Systems
TYPES OF MALWARE ON YOUR ANDROID [PART 2]
Forewarned is forearmed, this is the second part of our new category in our Blog! Here is a new threat, that is really hard to notice! Maybe you have it on your device right now. Check it! TYPES OF MALWARE ON ANDROID: » PowerOff Hijack Do you think, that the switched off phone is secured from… Continue reading TYPES OF MALWARE ON YOUR ANDROID [PART 2]