Explained: SQL injection

SQL injection is one of the most common attacks against businesses, with a high rate of success. So what can you do to prevent them?
Categories:

Business
Security world

Tags: breachcodedrop tableinjectionphp. aspquerysqlSQL injection

(Read … Continue reading Explained: SQL injection

How to protect your computer from malicious cryptomining

When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?
Categories:

101
How-tos

Tags: Chrome Task managercrypto-jackinghigh cpupreventslow computertroubleshoot

(Read… Continue reading How to protect your computer from malicious cryptomining

Bank robbers 2.0: digital thievery and stolen cryptocoins

A new generation of thieves, bank robbers 2.0, seek to steal huge amounts of money as anonymously as they can. So they’ve developed a multitude of ways to pilfer cryptocurrency.
Categories:

Cybercrime
Technology

Tags: bakcoinhivecrypto-currency… Continue reading Bank robbers 2.0: digital thievery and stolen cryptocoins

Stolen security logos used to falsely endorse PUPs

To gain the trust of users, the makers of PUPs put the logos of reputable security and tech firms on their websites to imply their product is endorsed by the companies. They are not.
Categories:

101
Social engineering

Tags: logosMcAfeemicrosoft… Continue reading Stolen security logos used to falsely endorse PUPs

New Chrome and Firefox extensions block their removal to hijack browsers

Two new extensions in Firefox and Chrome force install then hide from the user. Learn how you can protect yourself against them and remove them manually.
Categories:

Malware
Threat analysis

Tags: blockedchromeextensionsfirefoxnormal removalPiet… Continue reading New Chrome and Firefox extensions block their removal to hijack browsers

Cookies: Should I worry about them?

Are cookies a threat? The answer depends on how much you care about privacy. Learn how to manage cookies and stay in control of your data.
Categories:

101
Privacy

Tags: browsercachecookiesevercookiesflashsilverlightsupercookiesvideo plug ins

Continue reading Cookies: Should I worry about them?

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.
Categories:

101
Technology

Tags: bitmeterfiddl… Continue reading Free tools: Internet traffic monitoring

Free tools: Internet traffic monitoring

There are many reasons why you might want to start Internet traffic monitoring, especially if you’re a security enthusiast or amateur analyst. We list some free tools that have different use cases.
Categories:

101
Technology

Tags: bitmeterfiddl… Continue reading Free tools: Internet traffic monitoring

How cryptocurrency mining works: Bitcoin vs. Monero

Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons.
Categories:

Security world
Technology

Tags: bitcoinBlockExplorerBlockHashblocknumbercryptocurrencyminingmone… Continue reading How cryptocurrency mining works: Bitcoin vs. Monero