Malicious Touchscreens Can Compromise Smart Devices

With many Smartphones being made of Glass, or optimizing  space screen akin to the new Iphone X, one is bound to possibly shatter or crack their screen due to damage or accident. Upon doing so the goal is usually to repair the screen either via warranty, yourself, or by going to a 3rd party repair … More Malicious Touchscreens Can Compromise Smart Devices

Wannacry: The Ransomware That Spreads

Wannadecryptor, or better known as WannaCry, is a malware strain finding its roots in the Wikileaks’ NSA exploit tool leak from earlier last year. Microsoft specifically, exclaims that the ransomware utilizes the vulnerability codenamed “eternalblue” which impacts OS Windows XP, Windows 7, and Windows 8.  As of May 15 2017, the ransomware has infected over … More Wannacry: The Ransomware That Spreads

Persevering for Phishing: Google Doc Phishing Scandal and the Future of Phishing Schemes

On May 3rd 2017, 0.1% of  Google’s Gmail users were  victimized by a fake gmail phishing scam that stole OAUTH tokens (Open Authorization tokens that bypass the need for a password) and gave spammers access to the recipients emails, logins, contacts and online documents via a very convincing fake document sharing attachment. Some flags that … More Persevering for Phishing: Google Doc Phishing Scandal and the Future of Phishing Schemes

Mac Version of Handbrake Encoder Tampered With Backdoor

On May 6th 2017, the handlers of the popular video-transcoding application Handbrake warned users of a compromised  mirror at download.handbrake.fr  containing a variant of the mac specific, Trojan malware “Proton“. This infected version of Handbrake was estimated to be online from the dates of  May 2nd to May 6th. Furthermore, Mac security researcher Patrick Wardel … More Mac Version of Handbrake Encoder Tampered With Backdoor

Pinlogger.js Concept Steals Pin Via Gyroscope

According to a team of scientists at Newcastle University UK, they have developed a method to steal a smartphone’s PIN via the use of a javascript app that captures and implements the data generated by a phone’s gyrometer, GPS, camera, microphone, accelerometer, magnetometer, proximity, pedometer and NFC protocols. In fact, using said technique these cyber … More Pinlogger.js Concept Steals Pin Via Gyroscope

Malware Scanners as a Repository for Valuable Business Info

Threat intelligence manager Markus Neis brought awareness to a group of panelists at the Kaspersky Lab Security Analyst Summit regarding the capability for cyber criminals to utilize services such as VirusTotal to capture and retrieve uploaded sensitive documents. According to Neis, he produced such findings when he utilized an uploaded word document embedded with a … More Malware Scanners as a Repository for Valuable Business Info

Rensenware: The Ransomware Where you Pay With a Different Type of Points

Originally intended as a proof of concept, Rensenware is a new strain of file encrypting-malware that encrypts and locks the users’ sensitive files and data akin to Locky, Zepto, Cryptowall and other notable brands. What makes Rensenware unique to the malware scene however is  that according to  it’s creator,Tvple Eraser the only way to break … More Rensenware: The Ransomware Where you Pay With a Different Type of Points