News, Tips, Security Lab
Malware Hides in Images from the James Webb Telescope
Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing…
Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics
According to a new report from Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack…
Hidden Scams: Could QR Code Actually Be a Phishing Attack?
Although QR codes have been around for more than 25 years, their use in everyday life has increased dramatically since…
The LockBit Group Is Taking on DDoS Attacks
Last week, after the information security company Entrust was hacked, the LockBit hacker group was subjected to powerful DDoS attacks.…
Black Hat SEO: Is Someone Phishing With Your Site Domain?
Search engine optimization (SEO) is a process of optimization and upgrading of websites to improve the ranking of search engine…
What is Trojan CoinMiner csrss.exe?
Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…
How to protect your PC from a virus, that has infected systems all around the world? Be careful, WannaCry may come for you!
I think you’ve already heard about this virus. For the past few days, it spread to computers in 74 counties! The biggest impact we can see is in China, Russia,…
Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses
Something is off with your device and you have the premonitions why. You got infected with a computer virus. But put the panic aside and before you do anything in…
Top 10 Deadliest Virus in
Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…
How to become an expert in application security (Security tips)
Every day hundreds of new mobile applications appear in the App Store and Play Market. Some of them will have less than 10 thousand downloads, others are becoming unbelievably popular.…
Microsoft Tech Support Scam Affiliate Program
The new sector of cyber attacks has become popular nowadays. In the guise of Microsoft Technical Support (Microsoft Tech Support Scam). Scammers try to force Internet users into making a…
Once More About MongoDB Data Breaches
One of the biggest breaches of databases happened recently – personal information on nearly 50 thousand users was stolen and replaced by random files with instructions on how to get…
How can hackers crack your router?
Do you think that you are protected from hackers? Of course, you are using a wireless access point with encryption. You are wrong! pull your password from the air! There…
Top-6 biggest tech failures of 2016
Samsung Galaxy Note 7 The biggest failure of Samsung for all history is Galaxy Note 7. Smartphones started exploding, that caused a stoppage in production and users were forbidden from…
The Danger of Botnet Network: How to Detect Botnet on You PC
The word “botnet” is now ubiquitous, and almost all users know what it means. This is not surprising because this network can be virtually any device with Internet access. Such…
How to use Wi-Fi for free and keep your data private
Where do you plan to spend the most of your time this winter holidays? Malls, restaurants, cinema, ice rink… all these places have something in common. Free Wi-Fi – we…
Gift Shops Beware: The Importance of Cybersecurity in Online
Secure Your Gift Shopping This Winter Season! The holiday season is a time for home decoration, delicious food, and of course, gift-giving. As a gift shop owner, you want to…