web analytics

This Week in Security News: Fake Apps on iOS and Google Play and Social Media Security Issues

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the evolution of EDR to XDR (and why your CISO should care), stock trading app attacks and fake gambling apps. Also, read about how Instagram… Continue reading This Week in Security News: Fake Apps on iOS and Google Play and Social Media Security Issues

Gambling Apps Sneak into Top 100: How Hundreds of Fake Apps Spread on iOS App Store and Google Play

By Todd Han and Junzhi Lu (Mobile Threats Analysts) Google Play and iOS App store are no strangers to fake apps trying to trick users into downloading ad- or malware-ridden versions. We have previously reported on fake Android voice apps on Google Play, which were observed to be impostor apps for voice messenger platforms. Recently,… Continue reading Gambling Apps Sneak into Top 100: How Hundreds of Fake Apps Spread on iOS App Store and Google Play

Wikipedia Taken Offline by Massive DDoS Attack

Wikipedia DDOS Attack: Wikipedia Hacked, Down for Users Across the Globe A massive DDOS cyber attack on Friday forced Wikipedia offline in several countries across Europe and in parts of the Middle East. The website confirmed that it had been hit by a “malicious attack that has taken it offline in several countries,” including Germany,… Continue reading Wikipedia Taken Offline by Massive DDoS Attack

Best Antivirus Software List 2019 (New List)

Malware authors are so nefarious that they create deadly viruses to uncover your monetary data or prevent your PC from working by any means. What you require is the most ideal antivirus programming on your PC. Thanks to the lucky stars, as the giant leaders in the security industry do deliver their best products… Many… Continue reading Best Antivirus Software List 2019 (New List)

What is a Computer Virus and its Types

Computer Virus A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer… Continue reading What is a Computer Virus and its Types

Best 10 Free Android Hacking Apps and Tools (New List of 2019)

Android smartphones are now the most sought-after mobile phones due to its versatility, affordability, and user-friendliness. With the rise in the number of users hackers find them a rich source of a target and install Android hacking apps on both non-rooted and rooted devices as well. In this article, we will be discussing the list… Continue reading Best 10 Free Android Hacking Apps and Tools (New List of 2019)

Why Do Free Antivirus for Android Needed?

Some common advice many cybersecurity experts give when it comes to protecting computers from viruses is to install an antivirus. With so much malware on the internet nowadays, having an antivirus is essential for keeping you safe while browsing the web. But do Android phones need antivirus too? Should you be downloading a free antivirus… Continue reading Why Do Free Antivirus for Android Needed?

Why Should CISOs Care About XDR?

We have been collectively saying in our industry for the last 15-20 years that a layered approach to your security stack is a “best practice,” but as with all best practices, these are ideals rather than reality for so many charged with protecting their organizations. The vast majority of CISOs are saddled with legacy operating… Continue reading Why Should CISOs Care About XDR?

Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website

by Luis Magisa Unlike in the pre-internet era, when trading in the stock or commodities market involved a phone call to a broker — a move which often meant additional fees for would-be traders — the rise of trading apps placed the ability to trade in the hands of ordinary users. However, their popularity has… Continue reading Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website

Beyond The Standard CISO Cloud Security Guide

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and… Continue reading Beyond The Standard CISO Cloud Security Guide