Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …
Cryptocurrency code breached, targeting Bitcoin exchanges
It’s not uncommon today for a home to be equipped with security gear, home monitoring equipment and other internet enabled IoT devices, like IP cameras and wireless monitors. But the benefits of securing a home through new technologies can also…
Magecart is certainly on a roll as it has managed to rack up quite a kill rate of late. In its latest act, the group has stolen sensitive information of nearly 185,000 booking transactions from British Airways. This is the group’s second attack against…
US starts counter-espionage operation against Russia
For as long as there’s been an internet, there’s been cybercrime. Real-world criminal activity is mirrored in our digital lives. In both worlds, you find stalking, theft, extortion, destruction of property, and scams and schemes galore. And while we co…
Danabot opens a US account
After making its presence felt in Australia and European banks, Danabot, a modular Trojan horse has made its way to the States. Written in Delphi, the perpetual beta modular malware can take screenshots, log keys and stealin…
Keeping up to date with celebrity gossip is a sport for many of us. Staying on top of what your favourite celebrity wore to the latest Hollywood shindig and, of course who they were with can be very time consuming and often require extensive searching! But did you know that searching for your favourite celebrity […]
The post Aussie Ruby Rose is McAfee’s Most Dangerous Celebrity appeared first on McAfee Blogs.
New vulnerabilities found in NUUO surveillance software can put cybercriminals in the director’s chair. When exploited through a stack buffer overflow, the Peekaboo vulnerability grants hackers full control over the surveillance video. Assuming control…
By now, you should be familiar with that sudden bout of uncertainty as you are gearing up to install a new application. How do you check if an Android app is safe to install? Does it have a virus? What does a malware app even look like? If you have eve…