The Free Mobile Anti-virus you are using can be a Fake!

Credit to Author: Prachi Sudame| Date: Mon, 09 Sep 2019 12:10:30 +0000

Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is that one of these fake AV Apps has been downloaded 100000+ times already. These Apps appear to be genuine Anti-virus/virus-removal Apps with names like Virus Cleaner, Antivirus security, etc., but do not…

Read more

PowerShell: Living off the land!

Credit to Author: Aniruddha Dolas| Date: Fri, 30 Aug 2019 13:14:28 +0000

Trend of PowerShell based malware is increasing. General trend observed shows that malware authors use new techniques for infection and propagation of malwares along with open source tools. PowerShell gets executed with high privileges and that’s why it easily performs its activity and propagates through network. Quick Heal Security Lab…

Read more

REVIEW – “The Florentine Deception”, Carey Nachenberg

Credit to Author: p1| Date: Wed, 10 Jun 2015 16:22:25 +0000

BKFLODEC.RVW   20150609 “The Florentine Deception”, Carey Nachenberg, 2015, 978-1-5040-0924-9, U$13.49/C$18.91 %A   Carey Nachenberg http://florentinedeception.com %C   345 Hudson Street, New York, NY   10014 %D   2015 %G   978-1-5040-0924-9 150400924X %I   Open Road Distribution %O   U$13.49/C$18.91 www.openroadmedia.com %O  http://www.amazon.com/exec/obidos/ASIN/150400924X/robsladesinterne http://www.amazon.co.uk/exec/obidos/ASIN/150400924X/robsladesinte-21 %O   http://www.amazon.ca/exec/obidos/ASIN/150400924X/robsladesin03-20 %O   Audience n+ Tech 3 Writing 2 (see revfaq.htm for explanation) %P   321 p. %T   “The … Continue reading REVIEW – “The Florentine Deception”, Carey Nachenberg

Read more

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Credit to Author: Vaibhav Billade| Date: Mon, 19 Aug 2019 10:29:14 +0000

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps have been removed from Play Store after Quick Heal Security Lab reported it to Google last week. These apps continuously show installation prompt for fake “Google Play Store”. If any user falls…

Read more

Trinity Miner using open ADB port to target IoT devices

Credit to Author: Vallabh Chole| Date: Fri, 26 Jul 2019 10:08:11 +0000

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day gadgets are becoming smarter. All these IoT devices are powered by ARM-based processor and run on android and unix operating system. These IoT devices include mobiles, smart T.V., routers, IP cameras and…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

Beware! Email attachments can make you victim of spear phishing attacks

Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…

Read more

The Silence hacking crew grows louder

Credit to Author: Danny Bradbury| Date: Thu, 22 Aug 2019 10:32:26 +0000

The hacking group, which specialises in stealing from banks, has been spreading its coverage and becoming more sophisticated.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/harEaJXHeBo” height=”1″ width=”1″ alt=””/>

Read more

Ransomware disrupts 22 Texas government departments

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:44:59 +0000

On August 16, Texas local government became the latest victim of the expanding global racket that is ransomware.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/sXMvstdTRNU” height=”1″ width=”1″ alt=””/>

Read more

iPhone holes and Android malware – how to keep your phone safe

Credit to Author: Paul Ducklin| Date: Fri, 16 Aug 2019 14:13:44 +0000

Watch the latest Naked Security Live video for our non-technical tips to improve your online safety, whichever type of phone you prefer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wlXfZPzm5No” height=”1″ width=”1″ alt=””/>

Read more