Recently, Google had to take action to remove five fake Signal and three fake Telegram applications from the official Play Store. This is the result of a report from security researchers who found malicious versions of these apps hosted on the store. The reports surfaced in the first week of January. Researchers at the cybersecurity… Continue reading Google removes fake Signal and Telegram apps hosted on Play
Category: malicious
FBI makes a massive botnet infecting more than 700,000 computers uninstall itself
Recently, the FBI achieved a major milestone in the fight against cybercrime. The agency successfully managed to make one of the world’s largest botnets, which was responsible for infecting more than seven hundred thousand computers, uninstall itself. The botnet was discovered in 2018 when it was found to be using malicious software to simultaneously control… Continue reading FBI makes a massive botnet infecting more than 700,000 computers uninstall itself
How a Well-Regarded Mac App Became a Trojan Horse
In the world of tech, the term “Trojan Horse” refers to malicious software that appears to be a legitimate program but is actually malicious. The Trojan Horse, of course, was a wooden horse that the Greeks built to gain access to the city of Troy, and this term has been adopted to refer to hidden… Continue reading How a Well-Regarded Mac App Became a Trojan Horse
Microsoft signing keys keep getting hijacked, to the delight of Chinese threat actors
In an ongoing security disaster, Microsoft signing keys were recently hijacked twice, reportedly to the delight of Chinese threat actors. Signing keys are used to authenticate software, ensuring only trusted developers can create legitimate copies of a program. Without them, malicious actors can masquerade as trusted developers, potentially creating vast new channels for attacking vulnerable… Continue reading Microsoft signing keys keep getting hijacked, to the delight of Chinese threat actors
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
As an essential part of modern computing, users of Windows operating systems are well aware of the WinRAR application. This application is used to compress and extract files as well as create self-extracting packages, making it a popular tool for many computer users. Unfortunately, a very serious vulnerability has been identified with WinRAR that has… Continue reading WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
U.S. Space Companies Becoming Prime Targets for Foreign Malware, Federal Agencies Warn
In light of recent news about foreign attempts to access data belonging to U.S. space companies, federal agencies are warning that these companies are becoming increasingly attractive targets for malicious actors. Recent reports indicate that foreign actors have been attempting to access and exploit sensitive information related to unmanned aerial vehicles, satellite technology, and other… Continue reading U.S. Space Companies Becoming Prime Targets for Foreign Malware, Federal Agencies Warn
An Apple malware-flagging tool is “trivially” easy to bypass
Apple recently unveiled an update to its built-in malware-detection system, but a new research report shows the tool can be bypassed with relative ease. The tool, XProtect, is developed by Apple to protect Mac users from malicious software and malicious websites. However, researchers from security firm Synack have found a way to bypass the XProtect… Continue reading An Apple malware-flagging tool is “trivially” easy to bypass
Russia-backed hackers used Microsoft Teams to breach government agencies
Recent reports have indicated that Russia-backed hackers have successfully infiltrated government agencies by exploiting the online collaboration and video conferencing app Microsoft Teams. The attackers are believed to be associated with the Cozy Bear group of Russian hackers, who have been linked to cyber espionage operations targeting the US government since at least 2013. According… Continue reading Russia-backed hackers used Microsoft Teams to breach government agencies
Android malware steals user credentials using optical character recognition
Android malware is one of the most insidious types of security threats out there, as it can access your data and steal your credentials without you ever being aware. One of the latest methods used by malware creators is optical character recognition (OCR), which is capable of stealing your credentials without you having to do… Continue reading Android malware steals user credentials using optical character recognition
Researchers prove ChatGPT and other big bots can – and will – go to the dark side
In recent years, big bots such as ChatGPT and other similar AI technologies have revolutionized the way people interact with computers. These bots are becoming increasingly popular as they’re capable of understanding natural language and can provide users with the type of interaction they expect when engaging with chat technology. However, new research shows that… Continue reading Researchers prove ChatGPT and other big bots can – and will – go to the dark side