Malware

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions

Malicious Android applications appear harmless when looking at the store description and requested permissions, but this false sense of confidence changes when users get charged month over month for the premium service they get subscribed to without their knowledge and consent.

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions Read More »

Microsoft Uncovers Phishing As A Service Includes Easy To Use Templates Just Add Domain

Microsoft Uncovers Phishing As A Service Includes Easy To Use Templates Just Add Domain

Microsoft uncovered a large-scale organization and phishing-as-a-service operation. The turnkey platform budding criminals to create customized campaigns and develop their own phishing schemes complete with phishing kits, email templates, and hosting services needed to launch attacks.

Microsoft Uncovers Phishing As A Service Includes Easy To Use Templates Just Add Domain Read More »

New Windows Malware Targets Linux Subsystem To Evade Detection

New Windows Malware Targets Linux Subsystem To Evade Detection

New Python Based Malware Attack Windows Subsystem for Linux To Evade Detection
Republican Governors Association email server breached by state hackers
Windows 11 is no longer compatible with Oracle VirtualBox VMs
Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. Honey Beez and Trip Elix have unique experiences to share in an unpaired podcast experience.

New Windows Malware Targets Linux Subsystem To Evade Detection Read More »

Apple Devices Vulnerable iOS,iPadOS, WatchOS,tvOS,Xcode,Safari, iTunes

Apple Devices Vulnerable iOS,iPadOS, WatchOS, tvOS,Xcode,Safari, iTunes

Multiple vulnerabilities have been discovered in Apple Products, the most severe of these could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.

Apple Devices Vulnerable iOS,iPadOS, WatchOS, tvOS,Xcode,Safari, iTunes Read More »

Microsoft Ditches Passwords In Favor Of Software Apps What Could Go Wrong?

Video Podcast LISTEN ON Spotify Google Sticher Amazon Apple & More LISTEN ON Spotify Google Sticher Amazon Apple & More Share on facebook Facebook Share on twitter Twitter Share on linkedin LinkedIn Share on email Email Share on skype Skype Share on whatsapp WhatsApp Share on telegram Telegram Episode 5 Microsoft announced a new passwordless

Microsoft Ditches Passwords In Favor Of Software Apps What Could Go Wrong? Read More »