WhatsApp Vulnerability Allows Hackers to Manipulate Messages

A noteworthy WhatsApp vulnerability allows malicious users to infiltrate group chats and manipulate the messages of individual users. The hackers can take advantage of the malware method and abuse it to intercept and change contents of messages sent in… Continue reading WhatsApp Vulnerability Allows Hackers to Manipulate Messages

Ramnit Trojan Botnet Launched, 100 000 Computers Already Infected

The Ramnit malware as one of the most dangerous banking Trojans is known for causing numerous infections worldwide. The newly discovered Black botnet has been found to be made by the same collective. Our article gives details about the threat….Read m… Continue reading Ramnit Trojan Botnet Launched, 100 000 Computers Already Infected

Remove Yourencrypter@protonmail.ch Virus Infections

The Yourencrypter@protonmail.ch Virus is a new strain of the Paradise ransomware family. Refer to our in-depth article for a technical analysis and full removal instructions. Yourencrypter@protonmail.ch Virus – Distribution Ways The Yourencrypter… Continue reading Remove Yourencrypter@protonmail.ch Virus Infections

Hackers Target US Payment Processors via BGP Hijacking Attacks

Us payment processors report that they are being targeted by hackers using BGP hijacking attacks. This is a complex method used by experienced groups as it requires both resources and knowledge to execute one directly. BGP Hijacking Attacks Used Agains… Continue reading Hackers Target US Payment Processors via BGP Hijacking Attacks

Koadic Trojan Removal — Restore Your PC From Infections

The Koadic Trojan is a dangerous Python-based RAT that can cause serious damage to infected hosts. It consists of a modular engine and plugins that add to its functionality. Read our in-depth article to learn more about it. Koadic Trojan…Read more
Th… Continue reading Koadic Trojan Removal — Restore Your PC From Infections

Proof-of-Concept UBoat Botnet Replicates Real-World Weapons

The UBoat botnet is a proof-of-concept botnet that has been designed primarily for penetration testing and educational purposes. The author behind it has specifically stated that the main purpose behind it is to help security engineers understand how b… Continue reading Proof-of-Concept UBoat Botnet Replicates Real-World Weapons

CVE-2018-5390: Vulnerability in Linux Kernel allows for DoS Attacks

A vulnerability has been identified in the Linux Kernel (version 4.9+) which is tracked in the CVE-2018-5390 advisory. It lists several conditions that allow criminals to modify packets leading to the coordination of DOS (Denial of service) attacks. CV… Continue reading CVE-2018-5390: Vulnerability in Linux Kernel allows for DoS Attacks

Tech Support Scams Now Use Call Optimization Services

Computer security experts note that tech support scams are being updated to use call optimization services. Such platforms and tools are commonly used in legitimate call centers and service desks. This shows that the tech support scams continue to be….. Continue reading Tech Support Scams Now Use Call Optimization Services

Twittersploit Attack Leverages Dangerous Twitter Malware

Security experts alerted of a dangerous new infection methodology known as the Twittersploit Attack. In the center of it all is the use of several malware instances that use the Twitter social network service as a C&C (command and control)…Read m… Continue reading Twittersploit Attack Leverages Dangerous Twitter Malware

AutoWannaCryV2 Virus – Remove and Restore .wannacryv2 Files

The AutoWannaCryV2 Virus is a test release ransomware targeting English-speaking users on a global scale. The currently released samples of it are early versions that may be updated in further iterations. Refer to our in-depth article for a technical a… Continue reading AutoWannaCryV2 Virus – Remove and Restore .wannacryv2 Files