On the surface, the internet seems to offer anything and everything you might need – on demand and for free. Children and teens especially enjoy the benefits of being able to download any song, film, book, computer program or app they want. However, even the internet has its limitations. What children consider free, might actually … More Kids & downloading. Is it safe?
Scammers impersonating tech billionaire, Elon Musk, and inventor of ethereum, Vitalik Buterin, have stolen thousands in cryptocurrency from Twitter users. Scammers are using similar names and profile pictures to official Twitter accounts to trick unwitting Twitter users into sending small amounts of cryptocurrency, supposedly in return for larger amounts. The Twitter messages prompt users to … More Cryptocurrency Twitter scam
The lottery’s operator has found that attackers probably used an automated method known as ‘credential stuffing’ to access up to 150 customer accounts. The United Kingdom’s National Lottery is advising all of its 10.5 million registered online users to change their passwords as a safety precaution following a security incident. The recommendation comes after the … More UK’s National Lottery urges millions of players to change their passwords
While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone
If you’re a security practitioner or long-time reader of this blog, you may be all-too-familiar with the dangers of practicing “checkbox security”. By blindly following rules and directives without appreciating why they’re important, you may make short-term gains while ultimately dooming your long-term goals. That being the case, you may intuitively understand why “checkbox diversity” measures are … More How diversity in cybersecurity contributes to your company
In today’s day and age, when you ask a security expert about some basic tips to stay safe on the web, one of the most important things he will probably tell you is to download software only from legitimate sources. Sometimes even such a basic and obvious advice might not save you from malware encounters. … More Dangerous malware hosted on Download.com stealing bitcoin for years
ESET researchers have dissected some of the latest additions to the malicious toolkit of the Advanced Persistent Threat (APT) group known as OceanLotus, also dubbed APT32 and APT-C-00. A prolific purveyor of malware, OceanLotus has its sights set on high-profile corporate and government targets in Southeast Asia, particularly in Vietnam, the Philippines, Laos, and Cambodia. … More OceanLotus ships new backdoor using old tricks