Results for 'social engineering'

News

23andMe user data stolen, offered for sale

October 10, 2023 - Information belonging to as many as seven million 23andMe customers has been put up for sale on criminal forums following a...

CONTINUE READING
News | Personal

Multi-factor authentication has proven it works, so what are we waiting for?

October 6, 2023 - Recently, Amazon announced that it will require all privileged Amazon Web Services (AWS) accounts to use multi-factor authentication (MFA), starting in mid-2024. Our regular...

CONTINUE READING
Personal

Dependabot impersonators cause trouble on GitHub

September 29, 2023 - GitHub is experiencing issues of the “breached account and malicious code” variety. ITPro reports that unnamed individuals have been compromising accounts and using...

CONTINUE READING
MALWARE

Rogue scanners

Short bio Rogue scanners, also known as fake scanners, fake AV, or rogueware, are pieces of code injected into legitimate sites...

CONTINUE READING
MALWARE

Ransomware

Short bio Ransom malware or ransomware is a threat that prevents users from accessing their system or personal files and demands ransom payment...

CONTINUE READING
MALWARE

Point of Sale (POS)

Short bio Point-of-sale (POS) malware is software specifically created to steal customer data, particularly from electronic payment cards like debit and...

CONTINUE READING
MALWARE

Remote Access Trojan (RAT)

Short bio Remote Access Trojans are programs that provide the capability to allow covert surveillance or the ability to gain unauthorized access to...

CONTINUE READING
MALWARE

Trojans

Short bio Trojan is a malware that uses simple social engineering tricks in order to tempt users into running it. It...

CONTINUE READING
MALWARE

Worm

Short bio A computer worm is a type of Trojan that is capable of propagating or replicating itself from one system...

CONTINUE READING
PUPs

Commercial keylogger

Short bio Commercial keyloggers are applications designed to harvest user interactions with a computer. These interactions include the capture of keystrokes, usernames and...

CONTINUE READING