Remove 2011 Remove Phishing Remove Spyware Remove Technology
article thumbnail

Another NFT explainer, with a bonus look at the data security implications

Webroot

“What Bitcoin was to 2011, NFTs are to 2021.”. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. NFTs use the same blockchain ledger technology to verify uniqueness that cryptocurrencies rely on to prove ownership.

article thumbnail

Security Affairs newsletter Round 178 – News of the week

Security Affairs

. · Iran-linked COBALT DICKENS group targets universities in new phishing campaign. · Security firm attributes Cosmos Bank cyberheist to Lazarus APT. · Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted. · CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011. · Data of 130 Million hotel (..)

Spyware 41
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

Group-IB, a Singapore-based cybersecurity company, observed the growth of the lifespan of phishing attacks in the second half of 2019. Figure 1 The distribution of web-phishing among target categories . CERT-GIB’s findings indicate that phishing attack perpetrators have revised their so-called target pool. Target reshuffle.

article thumbnail

Mobile malware evolution 2020

SecureList

In 2020, Kaspersky mobile products and technologies detected: 5,683,694 malicious installation packages, 156,710 new mobile banking Trojans, 20,708 new mobile ransomware Trojans. The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers.

Mobile 132
article thumbnail

Meet the World’s Biggest ‘Bulletproof’ Hoster

Krebs on Security

For at least the past decade, a computer crook variously known as “ Yalishanda ,” “ Downlow ” and “ Stas_vl ” has run one of the most popular “bulletproof” Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1903 — Wireless Telegraphy — During John Ambrose Fleming’s first public demonstration of Marconi’s “secure” wireless telegraphy technology, Nevil Maskelyne disrupts it by sending insulting Morse code messages discrediting the invention. 2011 — ESTsoft — Hackers expose the personal information of 35 million South Koreans.

article thumbnail

NullMixer: oodles of Trojans in a single dropper

SecureList

NullMixer is a dropper that includes more than just specific malware families; it drops a wide variety of malicious binaries to infect the machine with, such as backdoors, bankers, downloaders, spyware and many others. The malware is known to be sold on online forums, and distributed via phishing emails. NullMixer execution chain.

Malware 108