Clouds of Dangerous TLStorm Appear on the Horizon

Probably everyone has heard of zero-day attacks. These are attacks that take advantage of previously unknown software or hardware vulnerabilities to accomplish their goals. However, these attacks are rare, generally coming from well-funded government or private hacking groups. Most serious cyberattacks occur when hackers exploit unpatched but known vulnerabilities. These attacks succeed in proportion to … Continue reading Clouds of Dangerous TLStorm Appear on the Horizon

Scamming, Spying, and Stalking Using Call Forwarding

I don't use call forwarding and, because of this, I'd be a perfect target for the call forwarding scam. So, if you know nothing about call forwarding, read this post or become a victim. It's as simple as that. Call forwarding is a useful service. If, for example, you want calls forwarded from your office … Continue reading Scamming, Spying, and Stalking Using Call Forwarding

Russia’s AcidRain Malware Destroys Satellite Receivers across Europe

Russia began its war on Ukraine with a series of wiper malware attacks. Wiper attacks simply want to make a device inoperable by destroying its boot sector. It's basically an offensive cyber weapon. As of this writing, there have been seven separate wiper malware variants identified. Among these was one which targeted Viasat modems. The … Continue reading Russia’s AcidRain Malware Destroys Satellite Receivers across Europe

Hackers Exploit Link Hovering to Steal Login Credentials

GoogIe, goog1e, goog/e, goog|e, G00gle, google, and google, are not Google. They are variations that hackers sometimes use to hide the name of the real site they want you to visit, because, when they get you there, they can take advantage of their ploy to steal your Google login credentials. In the Edge browser: GoogIe … Continue reading Hackers Exploit Link Hovering to Steal Login Credentials