Blog

Archive for the ‘cybercrime/malcode’ category: Page 93

Mar 26, 2022

4-word Facebook message you must ignore

Posted by in categories: cybercrime/malcode, finance

You’ve probably received this message already — just don’t open it. Details:


Facebook Messenger users have been told to ignore a four-letter message that could lead to disastrous financial consequences or stolen personal information.

Scammers use the instant messaging platform to send out a four-word “look what I found …” message, and a link from compromised accounts. These message also include emojis as well, 7News reports.

Continue reading “4-word Facebook message you must ignore” »

Mar 24, 2022

Teen Suspected of Being Mastermind of Lapsus$ Hacking Group

Posted by in category: cybercrime/malcode

A teenager in the UK may be the leader of attacks on Microsoft, Samsung and Nvidia, Bloomberg reports.

Mar 22, 2022

AI Experts Warn of Potential Cyberwar Facing Banking Sector

Posted by in categories: cybercrime/malcode, finance, robotics/AI

U.S. authorities have flagged the U.S. financial system, a central pillar in the U.S. sanctions regime, as an attractive target, and officials and security experts have warned for weeks about the possibility of retaliatory cyberattacks from Russia.

Mar 21, 2022

Malware That Can Survive OS Reinstalls Strikes Again, Likely for Cyberespionage

Posted by in category: cybercrime/malcode

A new malware strain that can survive operating system reinstalls was spotted last year secretly hiding on a computer, according to the antivirus provider Kaspersky.

The company discovered the Windows-based malware last spring running on a single computer. How the malicious code infected the system remains unclear. But the malware was designed to operate on the computer’s UEFI firmware, which helps boot up the system.

The malware, dubbed MoonBounce, is especially scary because it installs itself on the motherboard’s SPI flash memory, instead of the computer’s storage drive. Hence, the malware can persist even if you reinstall the computer’s OS or swap out the storage.

Mar 18, 2022

US government clients unaffected by Viasat cyberattack

Posted by in categories: cybercrime/malcode, government, law enforcement

“The investigation into the recent cyber event on the KA-SAT European network continues in partnership with law enforcement, government partners and Viasat’s third-party cybersecurity firm,” Viasat said in a statement March 11. “We currently believe this was a deliberate, isolated and external cyber event.”

Mar 18, 2022

This dangerous Android malware can steal money from your bank account

Posted by in categories: cybercrime/malcode, economics, finance, robotics/AI

The ‘Escobar’ malware has so far targeted customers from 190 financial institutions across 18 different countries. Specific details related to the country and institutions have not been revealed.

Mar 17, 2022

Samsung Confirms Massive Galaxy Hack After 190GB Data Torrent Shared Via Telegram

Posted by in categories: cybercrime/malcode, mobile phones

The NVIDIA hackers have now targeted Samsung. Here’s what Galaxy smartphone owners need to know.

Mar 15, 2022

Full visibility on software supply chain can reduce cyberattacks

Posted by in categories: business, cybercrime/malcode

Businesses need to have a complete view of where potential vulnerabilities or misconfigurations exist in the software supply chain.

Mar 15, 2022

Exclusive: China captures powerful US NSA cyberspy tool

Posted by in categories: biotech/medical, cybercrime/malcode, internet

China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim’s computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users’ information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.

According to the report, the Trojan horse, “NOPEN,” is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device’s information.

Through technical analysis, the center believes that the “NOPEN” Trojan horse is characterized by complex technology, comprehensive functions and strong concealment, which can fit a variety of processor architectures and operating systems. It can also collaborate with other cyber weapons and is a typical tool used for cyber espionage.

Mar 15, 2022

Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords

Posted by in category: cybercrime/malcode

French video game company Ubisoft on Friday confirmed it was a victim of a “cyber security incident,” causing temporary disruptions to its games, systems, and services.

The Montreuil-headquartered firm said that an investigation into the breach was underway and that it has initiated a company-wide password reset as a precautionary measure.

“Also, we can confirm that all our games and services are functioning normally and that at this time there is no evidence any player personal information was accessed or exposed as a by-product of this incident,” the company said in a statement.

Page 93 of 219First9091929394959697Last