Category Archives: Cybersecurity
FBI Released Public Announcement About Ransomware Threat
The FBI released a new public announcement about the ongoing ransomware threat. They stated that the attacks are becoming more targeted and with losses increasingly more damaging. HOW DOES RANSOMWARE INFECT ITS VICTIMS? The new public message lists the common infection vectors; namely, email phishing campaigns, Remote Desktop Protocol vulnerabilities and software vulnerabilities. IF MY…
Comodo Forums Hacked By Exploiting vBulletin Flaw
Comodo, one of the largest SSL Security Certificate Authorities notifies that their vBulletin Forum has been hacked. Comodo Group reported that 170,000 forum users had their data stolen by a hacker who exploited a recently disclosed vulnerability in vBulletin’s internet forum software. Comodo notifies its forum users According to the announcement from Comodo, an attacker exploited…
What Is A Data Breach?
A data breach is a security incident in which information is accessed without authorization. Data breaches can hurt businesses and consumers in a variety of ways. They are a costly expense that can damage lives and reputations and take time to repair. Personally identifiable information — such as full names, credit card numbers, and Social…
Remove These 25 Malware Infested Android Photo Editing Apps NOW
Many Android photo editing apps in the Google Play Store were found to be malware infested, cybersecurity firm Symantec said they should be removed Now. Symantec uncovered 25 malware infested apps in the Play Store, which were downloaded more than 2 million times. Symantec reported the malicious apps to Google already but if they are…
DoorDash Data Breach Affects 4.9 Million People
DoorDash, a food-delivery service, disclosed a data breach affecting 4.9 million people. Drivers, restaurants, and customers are affected. The company said in a blog post, user information was accessed by an unauthorized third party. Here’s a partial list of personal data that could have been affected. Names Email addresses Delivery addresses Phone numbers Hashed and salted…
Microsoft Update Broke Windows Defender
All your Windows Defender is broken thanks to a recent Microsoft Windows Update. The signature update was to fix a file causing system file checks to fail but the patch caused an even bigger issue, making Defender antivirus scans to fail altogether. The issue was in place for about a day before Microsoft re-patched the…
Xeon and Other Intel CPUs Hit by NetCAT Security Vulnerability
Intel’s server-grade processors are suffering from a vulnerability, which they dubbed NetCAT. The researchers at Vrije University in Amsterdam revealed on Wednesday The vulnerability enables a side-channel attack that can infer what a CPU is working on and is said to rely on issues with two Intel technologies found primarily in the Xeon CPU line: Data-Direct I/O Technology…
Social Media Website Logins Can Compromise Your Account
Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful. Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they…
Identity Thieves Pushing New Chase Phishing Scams
Identity thieves continually develop new ways to obtain your personal information. I personally have gotten the latest Phishing email scam these thieves are using. Looks like these Hackers didnt stop at just hacking Chase but now also taking advantage of the Chase breach to do more harm to people. This email is not legitimate. If…
Millions of Qualcomm based Android Smartphones Vulnerable
Security researchers from Tencent’s Blade Team released a notice that the Qualcomm chipset exposes millions of android smartphones to hackers. Any user with a tablet or phone that uses this cpu is effected by the flaw called QualPwn. The bug allows attackers to take control of the phones remotely by crafting special packets that are…