Hacking Humans: 5 Ways You Can Be Exploited on Social Media

If you have an active social media account on any platform, you’ve probably shared some private information, made some friends, or clicked a link that you came across while using it. Undoubtedly, social media platforms can prove to be useful to make connections and reach out to the wider world, but is it always the case?

Continue reading

Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Digital illustration of the Guy Fawkes mask.

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

In 2019, the United States Justice Department filed charges against Russian national Maksim Yakubets, offering a $5 million reward for information leading to his arrest.

Continue reading

New MosaicLoader malware targets software pirates via online ads

New MosaicLoader malware targets software pirates via online ads

You gotta be a newbie to fall for this BS…. but it is a lot of dumb lazy asses in the world these days…. smh

 

An ongoing worldwide campaign is pushing new malware dubbed MosaicLoader camouflaged as cracked software via search engine advertising to infect wannabe software pirates’ systems.

MosaicLoader is a malware downloader designed by its creators to deploy more second-stage payloads on infected systems, as Bitdefender researchers revealed in a report published today and shared with BleepingComputer last week.

Continue reading

FBI Had REvil’s Kaseya Ransomware Decryption Key for Weeks: Report

Feds just businesses floating in the wind…. is anyone surprised???

The Kaseya ransomware attack, which occurred in July and affected as many as 1,500 companies worldwide, was a big, destructive mess—one of the largest and most unwieldy of its kind in recent memory. But new information shows the FBI could have lightened the blow victims suffered but chose not to.

Continue reading

How Your Ad Blocker Can Track You Across the Web

Big business just don’t GAF about privacy or user rights….. hell did they ever?

 

Ah, ad blockers. Even if you aren’t among the growing number of people downloading one of these extensions, chances are you’ve heard people sing their praises for all sorts of reasons. They make the web a less cluttered, less laggy, less invasive place to be. So naturally, the money-hungry tech upstarts have found a way to ruin these tools for their own gain.

Continue reading

How to Run a Safety Check on Google Chrome

Google Chrome security
Google

This is a good idea to do from time to time…

We’re used to running antivirus scans on our computers, but that doesn’t cover your online safety. For that, Google Chrome offers a tool that lets you perform a similar checkup to secure your web browsing. Here’s how to run a safety check on Chrome.

Continue reading

Signal’s CEO Just Hacked the Cops’ Favorite Phone Cracking Tool


Israeli digital intelligence firm Cellebrite sells software designed to unlock phones and extract their data. As a result, its products are a favorite of law enforcement agencies across the U.S., and police frequently use them to gather evidence from seized devices. In the past, the company has received criticism for its willingness to sell to pretty much any government—including repressive regimes around the world. However, despite its mission to compromise phone security everywhere, Cellebrite would appear to have little interest in securing its own software—if you believe the CEO of encrypted chat app Signal.

Continue reading

5 Ways an Offline PC Can Be Hacked

Shit is real in the online battlefield….

Some people believe taking a computer offline makes it impossible to hack. These offline PC attacks show it’s not as safe as you imagine.

Data breaches are rapidly becoming a part of everyday online life. Even a cursory glance at the news highlights the latest leak of confidential or personal information onto the internet. While many people are increasingly concerned by these developments, it can often seem as though you are powerless against them.

Continue reading

Ghost hack – criminals use deceased employee’s account to wreak havoc – Naked Security

 

Many, if not most, organisations will tell you that they have processes and procedures that they follow when employees leave.

In particular, most companies have a slick and quick procedure for removing ex-staff from the payroll.

Firstly, it doesn’t make economic sense to pay someone who is no longer entitled to the money; secondly, many countries require employers to withhold payroll taxes automatically, to pay those taxes in promptly, and to account for them accurately.

Why get into trouble with the tax office over former employees when you can have a simple “staff leaving” checklist that will help to keep you compliant and solvent at the same time?

Unfortunately, we’re not always quite so switched on (or, to be more precise, not quite so good at switching things off) when it comes to ex-staff and cybersecurity.

Continue reading