Security News

Mobile Malware Evolution 2019 [Part 2]

We covered mild and moderately severe Android malware in part 1. Part 2 will focus on severe malware for Android, and how to avoid infections in general.

Severe Android Malware
Android Ransomware
Although not as common as Windows ransomware, file-encrypting or blocking malware for Android is a still a thing. Just like ransomware for computers, Android ransomware can spread via spam emails, malicious…

Cybersecurity news headlines 15-30 October

Cybersecurity news headlines 15-31 October, 2018
To continue our October addition of cybersecurity news headlines, we have the headlines from 15-31 October, 2018. In this addition, we report on US voters’ personal information being for sale, a Tumblr security bug that could have leaked users’ personal information, a huge data breach involving airline Cathay Pacific, and Facebook finally being fined for…

Mobile Malware Evolution 2019 [Part 1]

Android Malware
Every smartphone user is essentially carrying around a small computer in their pockets. And because many people keep valuable information on their phones, they’re becoming a target. Malware used to focus on computers in the past, but nowadays, you’re equally likely to have malware on your smartphone. Starting from adware that constantly shows you ads, to ransomware that takes…

Cybersecurity news headlines 1-15 October

Cybersecurity news headlines 1-15 October
Continuing our series of cybersecurity news headline articles, we have the headlines from the last two weeks. The cybersecurity news headline articles report on data breaches, malware attacks and all other major cybersecurity incidents. In this addition, we report on Facebook’s use of 2FA phone numbers for advertisements, an arrest of 7 Russian GRU officers, and…

Porn Blackmail Scam Email, October 2018

Sextortion scams are on the rise
Since July 2018, we have noticed a significant increase in sextortion emails trying to shame users into paying thousands of dollars. These spam emails, classified as a type of sextortion, claim that the user has been filmed watching pornography after his/her computer was infected with malware. There are a couple of different versions of the…

Cybersecurity news headlines (September 15-30)

In order to help you keep up with what’s going on in the world of cybersecurity, twice a month we publish articles detailing the biggest cybersecurity news stories from the previous two weeks. We provide information about data breaches, malware attacks and other major incidents related to cybersecurity.…

Cybersecurity news headlines (September 1-15)

Keeping up with cybersecurity news can be a challenge. To help you stay informed about what’s going on, twice a month, we will compile the biggest cybersecurity news stories into one report. Here you will find information about data breaches, widespread attacks, malware, and everything else related to cybersecurity.The first two weeks of September have been pretty calm, and we…

Most annoying scams of 2018

We all hope for a time when we do not have to navigate the Internet like a minefield, constantly having to avoid various threats trying to harm us. However, until such a time comes, we have to prepare ourselves. And one of the best ways to go about it is to inform yourself about what kinds of threat you could…

Cybersecurity news headlines (August 15 – August 31)

The second half of August has been quite unfortunate for certain companies due to serious data breaches that possibly exposed sensitive information of customers. Tech giant Apple, airline Air Canada and telecommunication company T-mobile were among them. There was also a rather bizarre hack that locked Instagram users out of their accounts, and Google was revealed to store people’s locations…

9 Ways to Hack Your Bitcoin Wallet

1. Email Phishing
An email arrives in your inbox, seemingly from a service you are familiar with or have used before. The email looks completely legitimate, but it is not. Hackers make their phishing emails look identical to legitimate service emails, with the same formats and design used, thus it can be difficult to differentiate them. In some cases, the company…