Our Blog - page 2
Q3 Cyberattacks and Trends: Social Engineering Takes the Upper Hand
COVID-19 strikes almost everything in the world, and the cybersecurity field is not an exclusion. Observing the Q3 events and incidents makes obvious the fact that Coronavirus has cardinally changed the world’s cybersecurity landscape and these changes look irreversible for the nearest future. More of that, these new trends seem to be able to distinguish…
Read MoreTOR Network Under Sophisticated Attack: Perpetrators Covertly Steal Users’ Bitcoins
Many people around the world deeply believe that using the Tor browser brings them unbeatable security and total anonymity. In reality, this belief puts you in danger. And a recent cunning attack on Tor users sharply demonstrates this fact. Many users who employed Tor to manage their cryptocurrency accounts fell prey to this attack. And…
Read MoreHow to Avoid Being Hacked Like Twitter: Fatal Mistakes You Should Correct Immediately
The recent Twitter hack quickly became one of the top news in the world. And there are at least two solid reasons for this. Firstly, the security system of such a powerful company as Twitter occurred to be flawed. Secondly, the attackers were able to break into accounts of the most powerful people of the…
Read MoreUpdated and more dangerous: FakeSpy comes back to steal money from Android devices
Have you received an SMS from your postal service that says you’ve got a package and should click on the included link for more information? Don’t do that! Otherwise, your smartphone will be brought under the total control of cybercriminals. They try to infect your device with a cunning malware named FakeSpy. Earlier such attacks…
Read MoreMacbooks under Attack: New Malware Steals, Spies and Extorts Ransom
Do you think your Mac laptop is bulletproof for malware? Unfortunately, many Mac owners believe in this delusion. Throughout much less malware exists for Mac than for Windows, Apple production can be vulnerable too. Recent research has found a new kind of ransomware especially created to attack Mac computers. Actually, it’s much more dangerous than…
Read More