Phishing attacks target the financial industry again, the case is in an accelerated rise, as more mobile banking applications are developed. More and more banking customers report banking accounts being losing money and malicious banking transfers that have no sms or one time password (OTP) for authentication and verification, either via the malicious app or
US President just signed new cyber security incident reporting mandates into law on Tuesday 15 March, making it a legal requirement for operators of critical national infrastructure (CNI) to disclose cyber attacks to the government, in specific to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours, and any ransomware payments made within 24
Ransomware continues to be the main security threat from now and beyond, even some nations classify it as a national security threat. Just imagine if the ransomware attack breaches the nation’s mission critical infrastructure and various government agencies, what will it be? Beside those high profile cases that the public exposed, but in real life,
Hackers focus on cryptocurrency exchange and digital token platforms now, if you are yet to be aware of it, you better act on it. Whether you are cryptocurrency exchange or digital wallet service provider, you need to focus your resources to make sure your infrastructure, system, services and application is perform end to end cybersecurity
Many of us are dependent on the computers and smart devices to complete our official, personal and household duties. The benefits are numerous but the threat posed by online fraudsters make it a scary place to venture without proper knowledge and protection. Cybercriminals create malicious programs called malware to rob legitimate users of their identity
Reverse engineering is the scientific method of taking something apart in order to figure out how it works. Reverse engineering has been used by innovators to determine a product’s structure in order to develop competing or interoperable products. Reverse engineering is also an invaluable teaching tool used by researchers, academics and students in many disciplines,
CryptoMix Ransomware for Children’s Charity? It is true or not? Before we go in detail to cover this cyber security threat, we should know what is CrytoMix and how it working. CryptoMix is a ransomware strain that was first spotted in March 2016. In early 2017, its author(s) renamed CryptoMix to CryptoShield. The spread of
What is the worst malware so far in 2018? The year isn’t quite over, but candidates for the role of “worst” have made themselves clear. According to a new report from Webroot, among the worst are three large botnets. The list starts with Emotet. Emotet is a Trojan that is primarily spread through spam emails
- 1
- 2