New T-RAT malware can be controlled via Telegram

G DATA’s specialists have published a report on the new T-RAT malware, which is being distributed for only $45. The main feature of the malware is that T-RAT allows controlling infected systems through the Telegram channel, and not through the web administration panel, as it is usually done. Malware creators claim that this provides faster… Continue reading New T-RAT malware can be controlled via Telegram

Alien malware steals passwords from 226 Android apps

ThreatFabric analysts have discovered a new Android malware Alien. The malware primarily targets banking applications. Overall, Alien steals passwords and other credentials from 226 apps. Alien is sold on hacker forums under the MaaS scheme (Malware-as-a-Service). At the same time, the malware was not developed from scratch, it is based on the source codes of… Continue reading Alien malware steals passwords from 226 Android apps

KryptoCibule malware steals cryptocurrency from Windows users

ESET specialists discovered the KryptoCibule malware, which has been active since 2018 and steals cryptocurrency from Windows users in the Czech Republic and Slovakia (these countries accounted for 85% of infections). KryptoCibule has three main functions and is capable of: installing cryptocurrency miners on victims’ systems (CPU and GPU miners are used to mine Monero… Continue reading KryptoCibule malware steals cryptocurrency from Windows users

Shlayer malware bypassed Apple security checks

Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple’s checks: it successfully passed the software notarization process and could run on any Mac running macOS Catalina and newer. In February of this year, Apple introduced a new security mechanism: any Mac software distributed outside the App Store must go through a notarization process… Continue reading Shlayer malware bypassed Apple security checks

How To Use Public Wi-Fi Safely: Risks To Watch Out For

In a world where almost everything comes with a price it’s sometimes nice to have at least free wifi. But starting with such a poetic intro here actually comes the real concern: how to use Wi-Fi for free and keep your data private.  Many people don’t realize it but using public Wi-Fi puts you at… Continue reading How To Use Public Wi-Fi Safely: Risks To Watch Out For

How To Fix a Computer That Randomly Restarts

Modern computers have working stability much higher than the stability of the computers in the late ‘90s – early ‘00s. Nonetheless, nasty bugs sometimes make us frenzy, because they make the working process problematic. Besides the BSODs and malicious software, there is a thing that is much harder to understand – constant PC rebooting. Be… Continue reading How To Fix a Computer That Randomly Restarts

Reasons to Start Cleaning Your PC Right Now

We may sometimes forget that our little friends aka computers also need some refreshment as well. Under refreshment, it is meant to thoroughly clean both hardware and software because they also often get dirty literally and metaphorically. But so far we will present you with reasons to clean your software because it’s the mind and… Continue reading Reasons to Start Cleaning Your PC Right Now

TYPES OF MALWARE ON YOUR ANDROID [PART 2]

Forewarned is forearmed, this is the second part of our new category in our Blog! Here is a new threat, that is really hard to notice! Maybe you have it on your device right now. Check it! TYPES OF MALWARE ON ANDROID:   » PowerOff Hijack Do you think, that the switched off phone is secured from… Continue reading TYPES OF MALWARE ON YOUR ANDROID [PART 2]