Category: PDATE TO THE LATEST ‘SOFTWARE

Capabilities of Toll Fraud Android Malware Apps Microsoft Warns About Evolving 

Microsoft Warns About Evolving Microsoft Warns About Evolving: has detailed the evolving capabilities of toll fraud malware apps on Android, pointing out its “complex multi-step attack flow” and an improved…

Other Ukraine allies Russian hackers targeting U.S.,

hackers targeting U.S hackers targeting U.S: The hackers successfully infiltrated networks in nearly 30 percent of the attempts. The report illustrates the global breadth and reaches of the Russian cyber…

 Hack its way through the pandemic How North Korea used crypto to

North Korea used crypto North Korea used crypto: At a time when North Korea has locked itself down for fear of the pandemic, hacking crypto exchanges has allowed it to…

IPhone Software Update Apple Faces $918 Million Lawsuit Over

iPhone Software Update iPhone Software Update: Consumer rights champion Justin Gutmann says Apple “throttled” the performance of older iPhone handsets after users installed upgrades that they were told would improve…

Notorious Russian Hacking Group Uses Lock bit Amid Ukraine: War From Malware to Ransomware

Notorious Russian Hacking Notorious Russian Hacking: While cyber-security firms have linked Evil Corp to two malware strains known as Dridex and Hades, the group’s usage of LockBit may lead hacked…

Hacking Scenarios: How Hackers Choose Their Victims Hacking Scenarios

Hacking Scenarios Hacking Scenarios: Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. May 6th, 2022 is a recent example. The State Department said the Conti strain…