cybercriminals

What Are The Motivations For Botnet Development?

Any device in the Internet may function as a zombie, a member of a botnet that follows the commands of the botnet malware. Both traditional PCs, servers, smartphone, and IoTs (Internet-of-Things). Botnets are a collection of Internet-connected devices infected with malware. These infected devices are called bots (or zombies). The type of malware that takes

[ Read More ]

FBI Warns Against TLS-based Phishing Websites

Here in thethreatreport.com, we always emphasize to our readers to always check the address bar of your browser for the “closed padlock” icon before logging-in to your web service accounts, whatever it maybe. The encryption protocol used is practically speaking still unbreakable even with today’s binary supercomputers. However, the age-old yet pretty effective security advice

[ Read More ]

14 Clever Ways To Secure User Login Credentials

The Tech industry has slowly but surely trying to provide the masses a new way to authenticate themselves to web services. New technology as the Windows Hello built-in to all Windows 10 computers with a webcam and SQRL, a QR code-based login system are currently being polished in order to provide users a convenient alternative

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Are Cybersecurity Issues Rampant Or Firms Are Just Lazy?

For years, we broke news about various organizations becoming victims of data breaches, cyber attacks, spear phishing, and other cyber crimes. We feel sorry for these firms, as nobody deserves to be in a very humiliating and financially stressing situation such as becoming a victim of cybercrime. Today, it is fairly normal to hear this

[ Read More ]

DDoS-For-Hire Suspect in Chicago, Pleaded Guilty

Threat actors, for all intents and purposes, are wise individuals. They have advanced minds and they always try to be a step ahead when it comes to covering their tracks before authorities and investigators complete the puzzle. Unfortunately, for some of them, they have not yet reached the art of cover-up as they leave their

[ Read More ]

Hackers Now Target Porn Site Users to Steal Their Credentials

Hackers now target porn website users, especially PornHub and XNXX users accounts and get away with their login credentials. This kind of hacking, as per security experts, has nothing strange about it. Pornography, despite many ongoing campaigns to decrease online pornographic content and traffic, remains one of the most popular and sought-after kinds of online

[ Read More ]

Formjacking is Getting Popular Among CyberCriminals

Formjacking is emerging to be one of the most favorite methods of hacking among cybercriminals across the globe. Formjacking is the hacking technique in which cybercriminals target retail websites with a malicious code that helps them in snatching customers’ credit card information. Thousands of websites are targeted every month in this manner and this kind

[ Read More ]

New Malicious Windows EXE Files Targeting Mac Detected

This might seem a bit odd, but it’s a fact- new malicious Windows .exe that target macOS computers have been detected. Security researchers at Trend Micro have discovered malicious Windows EXE files (which are supposed to run only on Windows platforms) that could bypass Mac’s security mechanisms and deliver malware on MacOS systems. A Trend

[ Read More ]