Hackers Are Hiding Code In Images To Fool Mac Users

In the world of hacking, steganography ranks as one of the most difficult methodologies to detect. If you’re not familiar with the term, it is the practice of embedding executable code inside images, which makes it virtually impossible to detect. The reason is simple:  Virus scanners are built around the idea of searching for text strings with identifiable malicious characteristics …

Watch Out For New Ransomware Called Phobos

There’s a new strain of ransomware making the rounds, and it’s a nasty piece of work. Called Phobos by its creators, the latest threat on the ransomware scene first made an appearance in December of 2018. While details are sketchy, what we know so far about it is grim indeed. Researchers at CoveWare have been dissecting and sifting through the …

Many Android VPN Apps Contain Malware Or Exploitable Weaknesses

If you’re like many seasoned ‘Netizins, you probably rely on some type of VPN to help ensure your digital privacy. Unfortunately, based on research conducted by Simon Migliano, you could very well be wasting your time. Mr. Migliano is the head of research at Metric Labs and is a respected name in the industry. He and his team have conducted an …

Ransomware Can Make Installing Illegal Software More Risky

Most reputable businesses don’t deal in illegal copies of commercial software, but there have been a few reported instances. There’s always the possibility that a cash-strapped individual that’s eager to do additional work from home might resort to installing a ‘cracked’ free copy of a program. Unfortunately, those who opt to go that route now run even greater risks than …

This Mac Malware Takes Screenshots Of Your Computer

There’s a new malware threat in the MacOS ecosystem called OSX.LamePyre.  If you haven’t heard of it yet, it belongs on your radar. At the moment, industry experts agree that it’s more of a crude work in progress.  Unfortunately, the danger of crude works in progress is that the hackers continue to develop them, making them a threat that gets …

Data On Millions Of Americans Leaked Through Open Server 

Bob Diachenko, the Director of Cyber Risk Research for Hacken, recently made a disturbing discovery.  He found an ElasticSearch server open and vulnerable on the internet, without so much as a password to protect it. Unfortunately, the server was leaking a staggering 73GB of data and had a number of databases cached inside the server’s memory.  In one of those …

12 Scams of Christmas

The 12 Scams of Christmas: How to Spot And Avoid Them

By BBB Serving Eastern Oklahoma. December 10, 2018. ‘Tis the season for holiday shopping, and consumers are expected to spend more this year than they did in 2017. The National Retail Federation (NRF) expects U.S. holiday retail sales to top last year’s, with Americans expected to spend a total of $682 billion. As shoppers set records on spending, Better Business …

Uber Gets Hefty Fine From The EU For Data Breach 

In recent years we’ve seen several companies suffer from hacks of various magnitudes. Over time, we’ve witnessed the growth of what could be described as best practices in terms of how to respond. The typical arc goes something like this: The hack is discovered.  Immediately thereafter, the company discloses the pertinent details about the hack, including the number of users …

Google Continues To Battle With Malware In Play Store

In recent months, Google has taken steps to tighten up its processes so that fewer poisoned apps find their way into the Google Play Store.  In addition to that, the company has stepped up its efforts to ruthlessly track down and remove malicious apps whenever and wherever they are found.  By most accounts, that effort has been successful. Sadly, it …

You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off computing resources, putting them to work for the miners who control the software, working for them to solve complex cryptographic puzzles which generate revenue for the hackers.  However, that’s not …