Skip to main content

Posts

Showing posts from June, 2019

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...

Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

For the last couple of years, there has been a surge in phishing attacks against businesses and unsuspecting users. What’s worse is that phishing, which was previously merely a fraudulent attempt to obtain sensitive information, is now spreading malicious content including ransomware. While tech and cybersecurity companies are focusing on providing top-notch security to their clients, cybercriminals somehow find new ways to achieve their objectives. The question is what are your options and how can you protect yourself against growing online threats?  If you are on the Internet you must have heard of Microsoft’s Office 365, a subscription service offered by the company as part of its Office product line which is currently being used by over   60 million   commercial customers. However, the company also provides online threat protection services such as Office 365 Phishing Protection. Regardless of the size of your business, Office 365 Phishing Protection...

Crooks steal $28M in crypto using Google Adwords & spoofed domains

Authorities arrested six suspects including five males and one female in simultaneous raids carried out in a joint operation. The raids and subsequent arrests were carried out to trace $28 million worth of stolen Bitcoin.  The raids were conducted as part of a 14-month long, large-scale, global police investigation involving European law enforcement agencies including Europol, European intelligence agency, and Europol’s Joint Cybercrime Action Taskforce, Eurojust, along with the South West Regional Cyber Crime Unit of UK, and Dutch police department Politie. According to the police, the arrested individuals, aged between 19 and 37, created replica websites for popular cryptocurrency exchanges including Blockchain.com. Using fake exchange sites, scammers managed to trap unsuspecting users into visiting them.  Furthermore, they created fraudulent   Google Adwords   buys so that Google search users are redirected to the replica sites. Through the fake ...

Mozilla’s ‘Track This’ lets you choose fake identity to deceive advertisers

Track This is a new kind of incognito, says Mozilla. It is a fact that everything that you do on the Internet such as using Facebook or Twitter, online shopping or aimlessly surfing the web, is being tracked. Haven’t you noticed that as soon as you search for something, ads relevant to the search start popping up on your mobile phone or desktop’s screens? Previously users didn’t have any way out to counter this tracking issue but now, thanks to Mozilla’s Track This, it is possible to protect yourself from such wide-scale and uncalled for tracking. Recently, Mozilla announced that  Track This  will now be part of its flagship Firefox browser. The announcement revealed that every browser is helping advertisers in tracking user preferences from the language to preferred websites and from shopping platforms to items in the cart. However, the tracking becomes a bit “shady” when cookies are used for collecting this information without users’ cons...

ViceLeaker Android malware steals call recordings, photos, videos & texts

Israeli Citizens are the Primary Target of New Android Mobile Spying Campaign Using ViceLeaker Malware, says Kaspersky. Kaspersky Lab researchers discovered an Android malware campaign active since 2016 and still going strong. Dubbed ViceLeaker; researchers claim that it is the product of a group of hackers that is specifically targeting Middle Eastern and Israeli citizens. ViceLeaker campaign utilizes the notorious surveillance malware called Triout, and Kaspersky researchers detected it for the first time in May 2018. It is worth noting that Bitdefender also  reported  about the campaign in one of their recent blog posts, therefore, Kaspersky isn’t the only firm to have detected the malware campaign. Initial analysis revealed that hackers were targeting “dozens of mobile Android devices belonging to Israeli citizens.” The spyware sensors used by Kaspersky detected attack signals from the device belonging to one of the victims along with the hash of an And...

New attack spreads LokiBot & NanoCore malware in ISO image files

Both NanoCore and LokiBot are Info-stealing Trojans. Security researchers at the San Francisco-based firm Netskope have discovered a new malware campaign distributing the info-stealer malware LokiBot and NanoCore via ISO image file attachments that appear to be an invoice. It is noteworthy that LokiBot malware was discovered back in October 2017 and is equipped with capabilities like turning itself into ransomware if the victim tries to remove it from their system. As for NanoCore, it is a data-stealing RAT discovered in April 2016 targeting Steam users and critical cyber infrastructure in the US and S.Korea. Another interesting fact about NanoCore is that its author 27-year-old Taylor Huddleston (“Aeonhack” on HackForums) was arrested in March 2017 and pleaded guilty in to developing NanoCore malware and admitted that he intended the product to be used maliciously. There is a growing trend in using LokiBot as the delivery payload across a...

New Windows 10 bug causes PCs to take longer to shut down

Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another minute to turn off your computer – The bug exists in USB Type-C Connector System Software Interface (UCSI) software. The new bug in Windows 10 is not a serious one, but it somewhat affects the usability of the computer and has not yet been fixed. Philip Froese, a Microsoft Tech Community employee,  explains  that the Windows 10 bug only affects version 1809 and causes the device to take longer to shut down if it is connected via cable to the USB-C-type input. Furthermore, the bug only occurs if this cable is connected to the device, for example, you are charging your phone with USB-C, you will have a one-minute delay in shutting down your PC. This is because the software is busy handling another connection or disconnection, in this case, it is your phone. Apart from the extra one minute, the sleep or shutdown process takes in this circumstance, t...

How Phishing Has Evolved in 2019

Phishing attacks host every kind of malware and ransomware attack but what’s worse is that these attacks are on the rise. Starting in 2012,  ransomware  took the Internet by storm, thanks to latest phishing techniques. Unsuspecting and unprepared users, both individuals and businesses, found their screens frozen, their data no longer their own, and the only chance of getting it back coming in the form of sending payment, usually with untraceable cryptocurrency, to the perpetrators of the crime. The number of these attacks grew year after year, topping 181 million in just the first six months of 2018, a 229% increase over the same timeframe in 2017. From there, a funny thing happened. Security, user awareness, and organizational control started catching up with ransomware in the second half of 2018. By the end of December 2018, ransomware attacks had  dropped 60%  year over year. Unfortunately, a decline of one form of malware tends to be cold comf...

7 Easy-to-Use Java Performance Tuning Tips

Are you looking for easy-to-use  Java performance tuning  tips because you want to learn more developer knowledge and experience because of the current over-complicated process of optimization techniques? With a bit of practice, there are a few easy ways to learn best practices that allow you to build and optimize a well-designed and executed application. One way to gain experience is to focus on Java performance tuning tips irrespective ofprogramming language.  1.Avoid Over-optimization Always stick to performance optimization best practices, or you run the risk of over-optimizing an application’s efficiency. Most notably, never perform any performance tasks before they are required. Preperformance optimization makes code harder to maintain and read long-term, which then lessens the effectiveness of an application. Without a doubt, software developers spend way too much time worrying about an application’s efficiency rather than effectiveness, which is...