cybercriminals

DDoS-For-Hire Suspect in Chicago, Pleaded Guilty

Threat actors, for all intents and purposes, are wise individuals. They have advanced minds and they always try to be a step ahead when it comes to covering their tracks before authorities and investigators complete the puzzle. Unfortunately, for some of them, they have not yet reached the art of cover-up as they leave their

[ Read More ]

Hackers Now Target Porn Site Users to Steal Their Credentials

Hackers now target porn website users, especially PornHub and XNXX users accounts and get away with their login credentials. This kind of hacking, as per security experts, has nothing strange about it. Pornography, despite many ongoing campaigns to decrease online pornographic content and traffic, remains one of the most popular and sought-after kinds of online

[ Read More ]

Formjacking is Getting Popular Among CyberCriminals

Formjacking is emerging to be one of the most favorite methods of hacking among cybercriminals across the globe. Formjacking is the hacking technique in which cybercriminals target retail websites with a malicious code that helps them in snatching customers’ credit card information. Thousands of websites are targeted every month in this manner and this kind

[ Read More ]

New Malicious Windows EXE Files Targeting Mac Detected

This might seem a bit odd, but it’s a fact- new malicious Windows .exe that target macOS computers have been detected. Security researchers at Trend Micro have discovered malicious Windows EXE files (which are supposed to run only on Windows platforms) that could bypass Mac’s security mechanisms and deliver malware on MacOS systems. A Trend

[ Read More ]

How to Secure Your ACS (Access Control System)

We live in a world where cybercrime has become a very common thing. Cybercriminals, who are turning more and more sophisticated with evolving technology, are always on the lookout for security holes that they can exploit to access systems, devices and networks to steal all kinds of data, ranging from corporate data to sensitive personal

[ Read More ]

Chinese Scammers Use Social Engineering to Swindle $18.6M

Fraud transaction through clever social engineering enabled Chinese phishers in successfully swindling an estimated $18.6 million from Tecnimont SpA’s Indian branch. With a cleverly written email that heavily resembles Pierrorberto Folgiero’s (the company’s Group CEO) was sent to Tecnimont Pvt Ltd, the phishers were able to persuade decision makers in the company’s India office to

[ Read More ]

2018 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Be Thankful You Weren’t At The ATM When This Happened

Cybercriminals are at it again, and this time they’re hanging out at the ATM. But they’re not stealing from anyone’s bank account directly, just removing all the money the machine is holding. Many ATMs can access up to $20,000 or more in cash, so it’s possible for cyber attackers to grab a lot of dough,

[ Read More ]

Really, How Safe Is The Camera On Your Device?

These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social

[ Read More ]

Why All the “Not Secure” Websites These Days?

Have you noticed a sudden rash of websites flagged as “not secure?” Every browser does it a little differently, but all the latest versions of the big four (Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari) warn users about unsecured websites. Since July, Chrome has started to mark every website as either “secure” or

[ Read More ]