A Facebook bug hunter just found a hole through which crooks could take over your personal Facebook pages. Facebook fixed it PDQ… Source: Sophos
A Facebook bug hunter just found a hole through which crooks could take over your personal Facebook pages. Facebook fixed it PDQ… Source: Sophos
Since June 2015, we have seen a steady growth in the number of mobile malware attacks that use superuser privileges (root access) on the device to achieve their goals. Root access is incompatible with the operating system’s security model because it violates the principle that applications should be isolated from each other and from the […]
Surely this has happened to you before: you’re browsing online and you come across a blog or website that has a plugin for Chrome that you think looks interesting or useful. You check out the developer’s website, have a look at the benefits and decide to download it. You click on the corresponding button and […]
As the number of connected devices increases, so too does the use of platforms which allow us to synchronize them all and access our files from any location. Saving documents on the cloud is especially useful in the corporate world, where all of the team is able to access and modify information without the need […]
Traditional viruses, defined as executables that were sent en masse to cause infection on a large scale, are already controlled by protection systems (Endpoint Protection Platforms). These are popularly known antiviruses which, as the name suggests, protect the system of the user. The problem is that cybercriminals have evolved greatly in recent years and so has […]
Everything that you send in an email, from the attachments to the text, goes on a dangerous journey every time that you click send. Its path is filled with traps that cybercriminals can use to steal your information. One of the tips that you should follow to protect the content of your emails is to […]
In June last year, US and European enforcement agencies and security firms worldwide, blocked the spread of Gameover Zeus botnet and brought it under control. This put a damper on Cryptolocker ransomware, as it relied on the servers used in the Zeus botnet. Gameover Zeus and Cryptolocker are some of the well-known malware that […]
WhatsApp – Você recebeu uma menssagem de voz… Have you also received this notification and understood it to mean that you have a voice message in WhatsApp? Yea, well, it’s nothing of the sort! As we already warned you in May, cybercriminals are continuing to try and attack us via emails in which they urge us […]
Today I ran into a typical fraud email claiming to come from a U.S. bank but with a twist! Analyzing the attachment, it turns out that there’s no malware inside but instead a new middle step to fool lesser security software. The original file name is “Swift confirmation .pdf” and it was created using Microsoft […]