FORGOT YOUR DETAILS?

Phishing attacks target the financial industry again, the case is in an accelerated rise, as more mobile banking applications are developed. More and more banking customers report banking accounts being losing money and malicious banking transfers that have no sms or one time password (OTP) for authentication and verification, either via the malicious app or

US President just signed new cyber security incident reporting mandates into law on Tuesday 15 March, making it a legal requirement for operators of critical national infrastructure (CNI) to disclose cyber attacks to the government,  in specific to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours, and any ransomware payments made within 24

Top-list-of-Ransomware-attacks-from-the-past-years

Ransomware rising to be the top threat, it is what the business across the globe is agreed to. It is nothing new, but at this point of time, every vendor still tries to offer a silo approach based on what they offer, whether it is a security vendor or backup or recovery vendor.  Either been

Ransomware continues to be the main security threat from now and beyond, even some nations classify it as a national security threat. Just imagine if the ransomware attack breaches the nation’s mission critical infrastructure and various government agencies, what will it be? Beside those high profile cases that the public exposed, but in real life,

Hackers focus on cryptocurrency exchange and digital token platforms now, if you are yet to be aware of it, you better act on it. Whether you are cryptocurrency exchange or digital wallet service provider, you need to focus your resources to make sure your infrastructure, system, services and application is perform end to end cybersecurity

Qualys Secure Seal Product Overview by E-SPIN

Many of us are dependent on the computers and smart devices to complete our official, personal and household duties. The benefits are numerous but the threat posed by online fraudsters make it a scary place to venture without proper knowledge and protection. Cybercriminals create malicious programs called malware to rob legitimate users of their identity

Definition and Meaning of Reverse Engineering

Reverse engineering is the scientific method of taking something apart in order to figure out how it works. Reverse engineering has been used by innovators to determine a product’s structure in order to develop competing or interoperable products. Reverse engineering is also an invaluable teaching tool used by researchers, academics and students in many disciplines,

Sextortion come with ransomware and trojans in 2018

Sextortion come with ransomware and trojans in 2019. So how would you feel if you’d get a mail that would tell you someone has been recording you while you had fun surfing on porn pages? By now you should now already that it is all a scam though: those pesky mails that want to make you

CryptoMix Ransomware for Children’s Charity?

CryptoMix Ransomware for Children’s Charity? It is true or not? Before we go in detail to cover this cyber security threat, we should know what is CrytoMix  and how it working. CryptoMix is a ransomware strain that was first spotted in March 2016. In early 2017, its author(s) renamed CryptoMix to CryptoShield. The spread of

Worst malware and threat actors on 2018

What is the worst malware so far in 2018? The year isn’t quite over, but candidates for the role of “worst” have made themselves clear. According to a new report from Webroot, among the worst are three large botnets. The list starts with Emotet. Emotet is a Trojan that is primarily spread through spam emails

Top-list-of-Ransomware-attacks-from-the-past-years

Now day Ransomware attacks give a bad impact to some of company and it still a serious threat. Ransomware is a type of malicious software from Cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. In 1991, a biologist spread PC Cyborg, the first ever ransomware,

TOP