Posts Tagged ‘hackers’

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance malware on a few “selected” smartphones by simply calling the targeted phone numbers over Whatsapp audio call. Discovered, weaponized and then sold by the Israeli company NSO Group that produces the most advanced mobile spyware on the planet, the WhatsApp […]

Read more

Officials: Beware Sierra Leone ‘one ring’ robocallers

sierra leone

DALLAS – If you are one of the many people who has gotten a late-night call from Sierra Leone, don’t be tempted to call the number back. The Federal Communications Commission is warning people about a reported wave of the so-called “one ring” or “Wangiri” scam. Robocallers allegedly target specific area codes in bursts and often call multiple times in the middle […]

Read more

Keep healthcare data safe from hackers

Keep healthcare data safe from hackers

The healthcare industry is shifting their data to cloud services to serve their patients better and improve accessibility. This puts personal health information (PHI) and personally identifiable information (PII) at risk of getting stolen by hackers. Healthcare security experts believe that data breaches aimed at medical facilities are becoming more frequent because of the high […]

Read more

4 types of hackers to watch out for

4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of […]

Read more

iPhone security vulnerabilities revealed

In a recent report published by Forbes, a major U.S. government contractor and Israel-based vendor called Cellebrite revealed their capacity to unlock every iPhone on the planet. This new addition to their services was specifically generated for law enforcement and forensic specialists. iPhone vulnerabilities leaked, is it true? A couple years ago, Apple had a […]

Read more

NEVER Throw Your Boarding Pass Away, Not Even After Your Flight

Everybody knows that a boarding pass is mandatory in order to board a plane. While we’re in the airport, we keep a close eye on our boarding passes, clutching them in our hands like they’re precious gems. But after we land, pretty much everyone ditches the ticket, whether it’s lost on the floor, compacted in […]

Read more

Hackers Use Drone-Mounted Laser to Control Malware Through a Scanner

This isn’t a sci-fi movie, this is real life… Watch as Hackers Use a Drone-Mounted Laser to Control Malware Through a Scanner. To bypass normal detection methods, researchers in Israel have devised a novel way to communicate covertly with malware. The technique uses a flatbed scanner as the gateway through which an attacker can send […]

Read more

Hackers use browsers to get credit card info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient. Unfortunately, it […]

Read more

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s […]

Read more

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you […]

Read more