Beware of fake Telegram Messenger App Hacking PCs with Purple Fox Malware
The Telegram messaging app Trojan installers are used to deploy the Windows-based Purple Fox backdoor to compromised systems. That's according to new research published by Minerva Labs, which describes the attack as different from intruders tha.....»»
Coaxing purple bacteria into becoming bioplastic factories
In a world overrun by petroleum-based plastics, scientists are searching for alternatives that are more sustainable, more biodegradable and far less toxic to the environment......»»
A new malware threat to macOS adds to the data-stealing surge
Mac users face another macOS threat that aims to steal your data and targets x86_64 and Arm architectures......»»
New macOS malware impersonates popular apps then steals your data
Security researchers have discovered new macOS malware that’s built to steal your most sensitive data. Dubbed ‘Cthulhu Stealer,’ the malware targets users by impersonating popular apps so it can harvest your system password, iCloud Keychain pas.....»»
Evolved and more powerful macOS malware strain sold cheaply to criminals
Researchers have discovered another data-seizing macOS malware, with "Cthulhu Stealer" sold to online criminals for just $500 a month.Cthulhu Stealer in action [Cado Security]The Mac is becoming even more of a target for malware, with warnings surfac.....»»
This new Android malware can steal your card details via the NFC chip
Security researchers spot a sophisticated attack that steals people's NFC data and can be used to steal money, and more......»»
Hacker dad who faked death to avoid child support sentenced to prison
Now he owes child support, plus about $80,000 to repair state death registries. Enlarge (credit: MikeCherim | E+) A Kentucky man has been sentenced to nearly seven years in prison after hacking into state registries to f.....»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
Political deepfake videos no more deceptive than other fake news, research finds
Concern about "deepfakes"—synthesized videos and audio clips in which a person's face, body or voice has been digitally altered—has come from both sides of the political aisle ahead of the 2024 election......»»
Self-dealing has a long history on crypto exchanges: Researchers investigate "wash trading"
In 2019, the American tech trading company Bitwise presented to the SEC that an astounding 95% of cryptocurrency exchanges were fake. This claim may be credited to a type of market manipulation called "wash trading," which involves inflating trading.....»»
x64dbg: Open-source binary debugger for Windows
x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the source code. It offers a wide range of features and a plugin system, allowing you to customize and extend.....»»
The bee"s knees: New tests created to find fake honey
Researchers led by Cranfield University have developed new ways to detect sugar syrup adulteration in honey, paving the way for fast and accurate tests to discover fake products......»»
The Paris Olympics saw a whole load of domain-related cybercrime
Cybercriminals targeted visitors the Paris Olympics with fake websites and social media site.....»»
This new threat proves that Macs aren’t immune from malware
The latest malware threat for Mac users targets popular browsers that you could be using this very instant. Which ones are affected?.....»»
Banshee Stealer malware haunts browser extensions on macOS
Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»
Tech support scammers impersonate Google via malicious search ads
Google Search ads that target users looking for Google’s own services lead them to spoofed sites and Microsoft and Apple tech support scams. The fake Google Search ads (Source: Malwarebytes) “In this particular scheme, all web resources u.....»»
Beware of fake WhatsApp groups that are stealing accounts!
It seems that there is a rise of fake WhatsApp groups that pretend to be someone you know to steal your account. The post Beware of fake WhatsApp groups that are stealing accounts! appeared first on Phandroid. Scams are everywhere out ther.....»»
IntelOwl: Open-source threat intelligence management
IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a.....»»
Chrome, Edge users beset by malicious extensions that can’t be easily removed
A widespread campaign featuring a malicious installer that saddles users with difficult-to-remove malicious Chrome and Edge browser extensions has been spotted by researchers. “The trojan malware contains different deliverables ranging from sim.....»»
Push alerts from TikTok include fake news, expired tsunami warning
News-style notifications include false claims about Taylor Swift, other misleading info. Enlarge (credit: FT montage/Getty Images) TikTok has been sending inaccurate and misleading news-style alerts to users’ phones, i.....»»