Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices in a not-so-fun way. Known as a monkey-in-the-middle or man-in-the-middle attack (MiTM), it’s a type of cybercrime that can happen to anyone. Here’s everything you need to know about mobile MiTM schemes specifically, how to […] more…Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…Don’t Take the Bait! How to Steer Clear of Tax Time Scams
For cybercriminals tax time is the most wonderful time of the year. They are in the shadows giddy, eager, and methodically setting a variety of digital traps knowing that enough taxpayers take the bait to render their efforts worthwhile. Indeed, with the frenzy of online tax filings, personal information (and money) moving through mailboxes, and […] more…Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages are fun Easter eggs or nods to fans. In the digital world, this kind of practice is called steganography, and messages are usually concealed in images, audio tracks, video clips, or text files. But, instead […] more…Badlock, another ‘major’ security bug that puts profits before patches
Some have accused the developer of profiteering by publicly revealing a vulnerability that amounts to effectively fixing their own code. more…Tor Project says it can quickly catch spying code
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be technically subverted or subject to court orders, which could force the project to turn over […] more…Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Code.org volunteer emails exposed in information leak
As a result, a Singaporean firm decided to try and poach a few members. more…Code.org Hacked, Emails and Locations Data of Volunteers Compromised 33
An anonymous reader allegedly quoting an email from Code.org, claims that the database of the non-profit organization has been breached: Tags: Security more…Source code for powerful Android banking malware is leaked
The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM. The malware family is known by several names, including GM Bot, Slempo, Bankosy, Acecard, Slempo and MazarBot. GM Bot has been sold on underground hacking forums for around US$500. But it appears someone […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…How Safe is Your Android Pin Code? A New Robot Can Easily Break In
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually […] more…Spy? Where? Mobile Spyware Hiding Right Under Your Nose
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that […] more…A better reason not to use Huawei routers: Code from the ’90s
Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. read more Incoming search termsTeer celog more…‘Tis the Season for Holiday Scams
This time of year, the air not only gets chillier but a bit cheerier for everyone … including online scammers. Holiday scams are a quick way to make a buck, and cybercriminals employ several holiday-themed schemes to weasel money and personally identifiable information (PII) from gift givers. Here are three common holiday scams to watch […] more…More information
- Vulnerability in embedded Web server exposes millions of routers to hacking
- Nvidia fixes hole that turns PCs into remote-control toys for hackers
- Apple’s iMessage service experiencing another disruption
- Financial cybercrime group abuses Windows app compatibility feature
- Krebs’ site under attack after alleged owners of DDoS-for-hire service were arrested
- Fancy Bear goes all out to beat Adobe, MSFT zero-day patches
- Google to turn on encryption by default in next Android version
- Google: We’ll pay $100k if you can hack a Chromebook remotely
- When it Comes to Threat Intelligence, a Multi-Vendor Strategy is Needed
- All CoinVault and Bitcryptor ransomware victims can now recover their files for free