The Latest - Page 949

CYBER NEWS
NotCompatible - The Toughest Android Malware Ever

NotCompatible – The Toughest Android Malware Ever

Creating an Android malware application can be quite easy even for a beginner in developing of software applications. Take an existing application, disassemble it with all the available tools which can be found online, change the code, make it open-source…

CYBER NEWS
wp-update-fixes-XSS-vulnerability

WordPress 4.0.1 Update Addresses Crucial Cross-Site Scripting Vulnerability

A crucial cross-site scripting flaw is patched in the latest WordPress Update – 4.0.1. The vulnerability compromises comment boxes on websites that apply the content management system software. Exploiting the flaw, an attacker would have to inject malicious JavaScript in…

CYBER NEWS

Error 0x80248015 – Windows Update Does Not Work on Windows XP

In the past few days, Windows Update has not been functioning on Windows XP. Error 0x80248015 occurs as IE8 loads the web page, and so the user cannot search for a fix. Despite the fact that Microsoft does not issue…

CYBER NEWS
DoubleDirect Attack Coming on the Rise

New DoubleDirect Attack Redirects Traffic from Google, Twitter, Facebook to Hackers

A new type Man-in-the-Middle (MitM) attack called “DoubleDirect” is spreading over the Internet these days. What the attack does is redirecting traffic of wireless connections from big web-site domains like Facebook, Google, Twitter, to malware-infected sites. Falling on such the…

THREAT REMOVAL
Windows AntiBreach Module

What Is Windows AntiBreach Module?

Windows AntiBreach Module belongs to the Rogue.FakeVimes family of rogue anti-spyware programs. Experts also classify the program as spyware because Windows AntiBreach Module uses scare tactics to lure the victims into purchasing a product they don’t need. Windows AntiBreach Module…

CYBER NEWS
Detekt Tool Identifies Government Spyware

Detekt Tool Designed to Identify Government Spyware

Detect has been built to assist activists, journalists and defenders of the human rights worldwide, by detecting spyware installed by governmental organizations in order to monitor certain subjects and their activities. Researcher Claudio Guarneri is the mind behind the open…

CYBER NEWS
New-PayPal-Phishing-Scheme

New PayPal Phishing Scheme

Everyone who uses PayPal service for their online payments has at least once received an e-mail pretending to be from the official PayPal support, stating that an unauthorized payment has been made out of the account. Most of these e-mails…

THREAT REMOVAL
Malicious Messages Offering Free Steam Games

Malicious Messages Offering Free Steam Games

Short Description of Steam Messages Numerous users of the game distribution platform Steam have reportedly received messages like “Is this you in the photo?”, “WTF Dude?” and “You will exchange this thing?”. These users should know that they have probably…

CYBER NEWS
A New Version of the Citadel Malware Targeting Password Managers

Citadel Malware with a New Version Targeting Password Managers

The Citadel Trojan has a new target – password managers holding the passwords that keep important management products safe. IBM Trusteer researchers have announced that they have informed the creators or nexus Personal Security Client, KeePass and Password Safe about…

CYBER NEWS
bittorrent

Security Researchers Accuse BitTorrent of Gaining Access to Users’ Information

A report stating that the file-sharing peer-to-peer shared service BitTorrent has several flaws in its security encryption was published last Sunday (16th November) by a group of security researchers in the Hackito web-site forum. The report states that the torrent…

HOW TO
spam-message1

How to Protect Your Android or iPhone from Unwanted Spam Messages

‘Special Deal IPhone 6 HERE!‘ – says one of the iMessages on your phone. ‘Get your new laptop 70% off price!‘, states another. If you’re using the iPhone or iPAD iMessage application, you have probably come across such messages, although…

THREAT REMOVAL
WindowsProtectManager

What Is WindowsProtectManager?

Developed by Ma Lin, WindowsProtectManager is promoted as a web browser extension that adds extra security to the user’s browsing experience. Experts classify WindowsProtectManager as PUP (potentially unwanted program) and adware because it displays numerous advertisements in the form of…

THREAT REMOVAL

What Is Zorton Win 8 Antivirus 2014?

Zorton Win 8 Antivirus 2014 Description Zorton Win 8 Antivirus 2014 is a part of the Breviax/FakeVimes family of rogue antivirus programs. Zorton Win 8 Antivirus 2014 behaves like a legitimate security tool, but its only purpose is to bring…

THREAT REMOVAL

What Is Zorton Win 7 Protection 2014?

Zorton Win 7 Protection 2014 has been categorized as a rogue antivirus program that acts like a legitimate security tool but is of no use whatsoever. Zorton Win 7 Protection 2014 belongs to the Breviax/FakeVimes family of rogue antivirus programs,…

CYBER NEWS
whatsapp-end-to-end

WhatsApp End-to-End Secure Encryption in Collaboration with Open Whisper Systems

WhatsApp, the worldwide famous messaging application have recently announced that they have implemented a secure text protocol for end-to-end encryption for all its users. They should not do anything though – the encryption will be installed automatically with the next…

CYBER NEWS
google-chrome-support

New Chrome 39 Version with No Support for SSL 3.0

Yesterday Google released the 39 version of their Chrome browser, fixing 42 vulnerabilities known altogether removing support for the notorious SSL 3.0 certificate which was subject to a POODLE malware attack last month. The attack was discovered by Google researchers…

REVIEWS
Legitimate Applications for Windows OS Can Be Replaced By Rogue Ones

Legitimate Applications for Windows OS Can Be Replaced By Rogue Ones

The developers in the mobile phone industry have figured out an easy strategy to replace a legit Windows Phone application with a malicious one that receives the permission for accessing information. The technique is not complicated at all – the…

CYBER NEWS
De-Anonymization Methods on the Tor Network

De-Anonymization Methods on the Tor Network

Recently, the option of de-anonymizing users on Tor network was discussed. This possibility led to numerous discussions online. The team behind the project assured that the false positive rate makes such attacks worthless. According to research done by a professor…

THREAT REMOVAL
Trojan.Cryptlock.J!gm

Trojan.Cryptlock.J!gm

What Is Trojan.Cryptlock.J!gm? Security experts rate Trojan.Cryptlock.J!gm as a low-level risk infection. Once active on the compromised computer, Trojan.Cryptlock.J!gm will run in the background and consume a lot of the system’s resources. Trojan.Cryptlock.J!gm may cause a slowdown in the system’s…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree