Home General

General

Everything general about this

Semi‑annual balance of mobile security 2019

Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the...

Week in security with Tony Anscombe

ESET researchers publish their findings on Mispadu, a banking trojan targeting Brazil and Mexico, and on DePriMon, a downloader with a unique installation technique ESET researchers uncover Mispadu, an ambitious Latin...

10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever. There’s a good reason phishing attacks...

Android keyboard app caught red‑handed trying to make sneaky purchases

The virtual keyboard app ai.type, which has racked up 40 million downloads, has been found to sign up users to premium services without their consent The Android version of the popular...

Introducing Lending by Blockchain Markets

Liquidity at any scale. Terms designed for crypto institutions.Today, we’re publicly unveiling our lending desk from Blockchain Markets.  Since quietly launching to a select group of clients in August, our...

Hackers Drop Masad Stealer and Steal The Sensitive Data via Telegram

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data via Telegram. Masad Stealer using Telegram as a command...

SIM Card Browser Vulnerability let Hackers Control Mobile

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system. The...

SOC Analyst All-In-One CLI Tool

Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process. The main goal of Sooty is to...

Avast Hacked – Hackers Using Avast Own VPN to Gain Network Access

Leading Anti-Virus software maker Avast hacked by unknown cyber-espionage groups using compromised credentials and gained the internal network access over their own VPN in earlier March 2019. Avast is one of...

APLICATIONS

Feds Seize Over 20,500 Domain Names For Selling Counterfeit Products

The operation, dubbed "In Our Sites (Project TransAtlantic VIII)," was conducted by Europol in association with the Interpol, the US National Intellectual Property Rights Coordination Centre...

HOT NEWS