Skip to content Skip to sidebar Skip to footer
Category image

Malware Attack

University of Washington Researchers Successfully Hacked Into Computer Using DNA

Until now, DNA was known to carry genetic information for growth and development.  Could you imagine the same deoxyribonucleic acid to act as a hacking agent?  Well, the researchers in University of Washington believe so.  Moreover, they have been successful in breaking through a computer system using this DNA malware. With this new co-relation between the digital and the biological world, hackers…

Read more

Russian Hackers, Turla APT Group, Targeting G20 Participants for Cyber-Espionage

The well-known notorious advanced persistent threat (APT) group Turla is currently targeting G20 attendees.  Believed to of Russian origin, they are conducting a campaign against policy makers, politicians and media reporters ahead of the G20 task force meet.  The conference is deemed to be held in Germany on 23-24 October 2017. The cyber criminals are distributing a KopiLuwak backdoor Trojan over mails to…

Read more

500+ Android Apps With 100Mn+ Downloads on Google Play Store Found Malicious

Android apps on Google Play Store can turn your handset as a spying agent.  More than 500 million apps were observed to be infected by a range of spyware.  The report was given out by U.S. based security firm, Lookout.  But you can breathe easy now.  Google has tackled this problem.  The malicious apps have been deleted from the…

Read more

Hackers Installing Malicious Tools via Video Links in Facebook Messages

You might be using your Facebook chats to connect with your friends.  But hackers are using “your” Facebook chats to spread malware.  Yes, it is not through another profile that the scam is spreading. The hacks being carried out in Facebook Messenger is an increasing menace.  It primarily attacks you by messaging you a video link.  This link is corrupted and…

Read more

Chinese Hacker Arrested by FBI for Distributing Malware in 2015 OPM Breach

The U.S. OPM had suffered a great setback with a cyber infringement incident reported in 2015.  The Office of Personal Management (OPM) data breach had exposed personal information of about 25.7 million Americans.  This was believed to be carried out through a malware called Sakula. In the wake of this incident, a Chinese national was arrested…

Read more

‘Joao’, the New Gaming Malware, Is Targeting Gamers Worldwide

You might be addicted to gaming.  But the virtual criminals seek out their lucrative affairs through your online games.  The silent attack comes forth when you execute a game launcher.  You would be enjoying your game without any disruption.  But behind your back, a malware covertly establishes itself in the background.  This could then hand…

Read more

Non-Banking Apps Are New Target of Android Trojan Which Was Targeting Banking Apps

Do you cling onto the custom of booking taxis/flights/tickets using your Android devices?  Then you should be on your guard.  As of late, cyber criminals have turned their attention from banking to prospective non-banking apps.  Kaspersky Labs observed that the Android Trojan that has targeted the banking apps previously, is now eyeing on your non-banking activities as well. You…

Read more

Chinese Hackers Are Using ‘Game of Thrones’ Leaks for Phishing via Emails

The Game of Thrones fantasy might have hooked you to its latest updates now and then.  Along with the episodes, you might have as well enjoyed the leaks streaming across the web.  Well, while you fancy all this, you might have fallen prey to operation 9002 RAT.  This remote access trojan (RAT) could lure to…

Read more

Ransomware Developing Tools Are on Sale, Can be Used Even With Basic Skills

You might be using your Android apps to play games, download movies and books, banking and many more.  But the same is now being used by cyber-thieves to build their own ransomware.  A new tool, called Trojan Development Kit helps even neophyte hackers to create any file locking malware on your Android device. This ransomware developing…

Read more