Author Archives: Admin

Google Play Protect Detects New Malware Targeting Android

Posted on December 8, 2017 by Admin

If you haven’t heard of Google’s new product for helping to protect Android users, it’s called Google Play Protect. And it now has identified malware, called Tizi, that has infected targets across the world.  It is spyware and gets to your Android device through an app advertised on social media  and third-party app stores. Once it’s installed, it will gladly grab your personal data from apps such as Facebook, Twitter, WhatsApp, Linked, Skype, and others.

It also exploits several

Read More...

Posted in Cybersecurity, Social Engineering

Image Sharing Site Imgur Hacked In 2014 - 1.7 Million Records Exposed

Posted on December 4, 2017 by Admin

Uber isn’t the only company recently announcing a data breach that occurred long ago. News of the popular image-sharing site, Imgur made it out just after Uber admitted it concealed a breach of 57 million records. Imgur suffered a breach as well…back in 2014. The company was just made aware of it recently by Troy Hunt, who runs the data breach service Have I Been Pwned. Information exposed in the incident included poorly secured passwords.

To its credit, the company started reacting

Read More...

Posted in Cybersecurity, Social Engineering

Netflix Update Steals Your Login Credentials And More

Posted on November 16, 2017 by Admin

Netflix customers are once again being targeted in a recent scam. The scammers are posing as an employee of the streaming website in an attempt to steal Netflix login credentials and payment card information. They will use the payment card details to make purchases themselves or sell the information on the Dark Web. What do they do with the login credentials? They try the login combination on other sites, hoping to get to your bank account or into some other site that has very sensitive

Read More...

Posted in Cybersecurity, Social Engineering

Next Level Cyber Security: What, How, and Why?

Posted on November 3, 2017 by Admin

There’s no point in denying it, some aspects of cyber security are just more interesting than others.

For instance, nobody really wants to endlessly patch new vulnerabilities day after day, week after week, month after month. They’d much rather be on the front lines analyzing the latest malware, or penetration testing new applications. 

And who can blame them? If you’ve ever been to a security conference, you’ve seen how sophisticated the latest security products and services are.

Who

Read More...

Posted in Cybersecurity, Social Engineering

Phishing For Students On The Rise

Posted on October 30, 2017 by Admin

Educational institutions and students of all ages are great targets for phishing attacks. A constant barrage of emails throughout the school year create inbox chaos for all involved. Holiday and tax seasons are also ripe for phishing. Figuring out what emails are legitimate is frustrating at best, and many are sent without the recipient requesting them. From the college bookstore to upcoming events, these emails could literally be from anyone. Overworked IT departments and unsuspecting

Read More...

Posted in Cybersecurity, Social Engineering

A Single Weak Link Can Sink The Whole Company

Posted on October 26, 2017 by Admin

Recently, ransomware called WannaCry was set loose to infect computers all over the world. At last count, it compromised organizations in over 150 countries and infected over 300,000 machines. Interestingly, the attack itself was not particularly sophisticated. In fact, it was spread through a simple email phishing campaign and exploited vulnerabilities in Microsoft Windows that had already been publicly disclosed with patches available.  While WannaCry spread quickly, it was only active for

Read More...

Posted in Cybersecurity, Social Engineering

Don’t Get Hooked Unsubscribing

Posted on October 23, 2017 by Admin

Clicking the ‘Unsubscribe” button in a harmless looking spam email brings a new level of security threat. Phishers have come up with a way to take advantage of us by combining our curiosity and frustration with spam emails. It’s created a new cyber gnat determined to get your valuable information. A lways looking to take advantage of human nature, cyberthieves have a variety of tried and true scams at their fingertips. It’s time to think twice before hastily unsubscribing to spam emails.

One

Read More...

Posted in Cybersecurity, Social Engineering

SMS Fraud Makes for Expensive Wallpaper

Posted on October 20, 2017 by Admin

SMS fraud occurs when messages are sent from device without the user’s knowledge. Users may also be subscribed to paid online services; again, without their knowledge. This is what has been happening for an undetermined time to some Android owners who downloaded any of over 50 malicious apps from the Google Play Store starting in 2015. Security Company, Check Point determined that overall, in excess of 4.2 million downloads occurred of these apps. That’s a 282% increase since 2015 and

Read More...

Posted in Cybersecurity, Social Engineering

Nearly 1.4 Million New And Unique Phishing Sites Created Monthly

Posted on October 19, 2017 by Admin

If you take the Public Service Announcements (PSA) from the FBI seriously, you will be a bit on edge about one in May. It claimed that phishing scams cost businesses in the United States over $500 million each year. That’s nothing to cough at. In fact, phishing scammers are taking advantage of phishing at breakneck rates. Webroot recently released its Quarterly Threat Trends Report breaking the news that 1.385 million new and unique phishing sites are created each month.

Unfortunately, there

Read More...

Posted in Cybersecurity, Social Engineering

WiFi Flaw Leaves Everyone At Risk

Posted on October 16, 2017 by Admin

It is not a trick and most certainly, is not a treat.  A researcher from a university in Belgium has discovered a weakness that can be exploited in nearly all WiFi routers. It is cleverly being referred to as KRACK, which is an acronym for “key reinstallation attacks.” Suffice it to say, that anyone using a WiFi connection is vulnerable to possible attack until the patches are released from the vendors.

All operating systems have this flaw, but the most at risk is Android 6.0 (Marshmallow)

Read More...

Posted in Cybersecurity, Social Engineering

Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint