CALL US

+91 8219776763

Blog

Email Phishing Scam

New Phishing Email Scams- “Confirm Your Unsubscribe” Request

By Prempal Singh 0 Comment August 7, 2019

Email Phishing Scams – An Unsubscribe confirmation request is a long-running scam email campaign that pretends to be seen an uptick recently. These emails should never be responded or clicked as they are designed to perform some type of scam or to harvest working email addresses. The scam aims to gather active email addresses which […]

New Ransomware

New Ransomware for Android Infect Its Victims uses SMS Spam

By Prempal Singh 0 Comment August 6, 2019

Hackers use different ways to breach into a smartphone using  viruses, malware, worms, Trojan horses, phishing, etc and gain access to the personal information. Android devices are targeted by a new ransomware family by spreading to other victims by sending text messages containing malicious links to the entire contact list. This ransomware malware differs than […]

Apple iOS 4 out of 5 Security flaws Disclosed, By Google Researchers

By Prempal Singh 0 Comment August 6, 2019

Google’s researchers have finally disclosed details and proof-of-concept exploits for security flaws in Apple iOS that impact the iOS operating system and can be exploited via the iMessage client. The vulnerabilities don’t require any user interaction to be exploited. All the flaws, Details about one of the “interactionless” vulnerabilities have been kept private because Apple’s […]

Trickbot

Warning!! Windows Defender can be Disabled by New Version of TrickBot Trojan

By Prempal Singh 0 Comment August 5, 2019

TrickBot is a particularly stealthy banking Trojan which has existed since 2016. Since then, it has been thought to have leaked at least 250 million email accounts in order to distribute malware payload. TrickBot is a banking Trojan that  continues its evolution of targeting software security in order to prevent its removal and  detection. TrickBot […]

Flaws In Contactless Visa Card, Hacker Can Bypass It’s Spending Limits

By Prempal Singh 0 Comment August 5, 2019

Researchers have discovered a technique for exploiting Visa card frauds. The contactless Visa card vulnerability can allow the attacker to bypass payment limit checks. that requires a user’s verification. The attackers can exploit the flaw via man-in-the-middle attacks to conduct large-scale fraud. As mentioned in a blog post, researchers of Positive Technologies, tested the exploit […]

error: Content is protected by Cyberops !!