Category: Vulnerability

April 25, 2018 Arrunadayy Koul No comments exist

Security researchers observed a new ransomware strain dubbed VevoLocker. Its variants have already encrypted multiple websites, including the official webpage of the Ukrainian Ministry of Energy and several Danish webpages. Before seeing what steps you have to take to avoid this infection, let’s examine it further. How the infection happens: Exploiting well-known vulnerabilities in popular…

March 25, 2018 Arrunadayy Koul 3 comments

It’s no surprise – Facebook knows a great deal regarding you, your likes and also dislikes. But do you know, if you have installed Facebook Messenger app on your Android device, there are opportunities that the company had actually been gathering your contacts, SMS, and also call history information a minimum of till late in…

January 29, 2018 Arrunadayy Koul 4 comments

Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data stored by the users. The vulnerability impacts Lenovo ThinkPad, ThinkCentre and ThinkStation laptops,  models that run Windows 7, 8 and the 8.1 operating systems. Fingerprint Manager Pro is a utility for Microsoft…

January 12, 2018 Arrunadayy Koul No comments exist

This week we wrote about Fake Chrome MinerBlock Extension which is playing Video in the background. Ready for the weekend? Keep calm and read some of the most important news in our weekly cyber security round-up. 1. Wi-Fi Alliance Launches WPA3 Protocol with New Security Features Probably one of the most important news of this week…

January 9, 2018 Arrunadayy Koul No comments exist

Fake MinerBlock Extension Legitimate MinerBlock Extension Security researcher Bryan Campbell discovered a malicious Chrome extension today that is masquerading as the legitimate MinerBlock extension. The legitimate MinerBlock extension is used to block sites that utilize in-browser cryptocurrency mining, while the newly discovered version causes Chrome to repeatedly play videos in the background without your knowledge. The Chrome Web…

January 6, 2018 Arrunadayy Koul No comments exist

Before we tell you about the most relevant cyber security news of the first week of this new year, We want to wish you all “Happy New Year” and a very safe and secure 2018! It’s been only 5 days of this year and we already learn about two major and severe security flaws found…

January 5, 2018 Arrunadayy Koul 1 comment

OK, 2018 has just started and it has totally borked all networks in the whole world. That’s a fine mess we’re in to start off the year.:) Meltdown and Spectre are CPU hardware design flaws that we techies understand. In a nutshell, Meltdown breaks the isolation between the user app and the OS, so the…

January 3, 2018 Arrunadayy Koul No comments exist

A design flaw in Intel microprocessors has Linux and Microsoft Windows developers reworking their kernels to defend against exploitation of the security bug. Details of the flaw have not yet been made public, and Intel and Microsoft have remained mum about the chip design flaw, which was first reported by The Register this week. The report said…

December 23, 2017 Arrunadayy Koul No comments exist

This week we published a security alert about a new wave of spam campaigns containing the Emotet banking trojan that can exploit Windows admin rights on users’ PC. We also included a protection guide to better fight against these online threats. 1. Top 25 Worst, Most Insecure Passwords Used in 2017 How secure are your passwords? Are you…