A malware researcher going by the Twitter handle, Benkow moʞuƎq, has uncovered a huge stash of emails and passwords stored on an open server in The Netherlands. The stolen credentials were apparently harvested by a spambot known as, Onliner. This spambot has been used to deliver banking malware which has compromised over 100,000 accounts. Troy … Continue reading Massive 711 Million Emails and Passwords Dumped and You Are Probably on the List…I was
Month: August 2017
How Free Security Tools and Online Scanners Are Used by Hackers
Endpoint detection and response (EDR) tools are becoming more common on those networks which allow access to a wide variety of endpoints such as smartphones and tablets. Basically, these tools continuously monitor behavior on these devices to see if anything unusual is going on. The information collected through this monitoring is sent to a central … Continue reading How Free Security Tools and Online Scanners Are Used by Hackers
How Oppressive Governments Hack Opposition Twitter Accounts to Spread Fake News
By now, you probably know that you can't believe any news unless it is from a site that you trust. But what if you learned that your trusted site can be made to spread fake news? How could you ever be sure that the information it gave you was true? In fact, how can you … Continue reading How Oppressive Governments Hack Opposition Twitter Accounts to Spread Fake News
The Awan Family Scam: A Triumph of Political Correctness Over Cybersecurity
After being subjected to numerous, damaging cyber attacks, you would think the Democrats would have learned their lesson and become more cybersecurity aware. Unfortunately, this does not seem to be the case. As the scam perpetrated by the Awan family on House Democrats unfolds, it becomes apparent that it succeeded because of poor cybersecurity practices … Continue reading The Awan Family Scam: A Triumph of Political Correctness Over Cybersecurity
Hammertoss: The Russian Government Malware that Uses Twitter to Steal Information
Antivirus software can't find every malware program on your computer or device. This does not mean you shouldn't use it, only that all malware detection software has limitations. Good malware designers know this and know how to hide their exploits so they don't expose themselves. Your device might be working perfectly well and still have … Continue reading Hammertoss: The Russian Government Malware that Uses Twitter to Steal Information
The Revenge of the Things
There was once a time when the things in our homes were stupid. In the evenings of those bygone days, the family would gather together to stare at the television as it sat sullenly in the corner of the room. Occasionally, one family member, often the father, would walk over and give it a smack … Continue reading The Revenge of the Things