Posts

Showing posts with the label malware

Is the virus really coming from the torrent site?

Image
Is the virus really coming from the torrent site? Computer viruses are spreading in different ways. The risk is the same even in torrent files that many of you download. In fact, many popular torrent sites have a lot of malware. Malware can be prevented to a large extent even if you are confident in what you are clicking and what you are downloading. But today's malware has become so modern that even if you just watch a viral ad, it will come and stay on your device. As Torrent is a popular download site, the presence of virus attackers is also increasing here. When you use torrents, viruses attack your system in the following two ways. 1. Transmission method (online advertising) Online ads (malware) designed to spread the virus increase the risk on computers or mobiles. Since the virus does not appear on the screen outside the torrent site, there is a high possibility of the virus coming from such a site. Malvertisation of Pirate Bay In May 2016, security experts found a viral ad

Chinese hackers spreading malware in the US from fake McAfee software

Image
Chinese hackers spreading malware in the US from fake McAfee software Google says hackers linked to the Chinese government are spreading fake McAfee antivirus software and spreading malware to users' devices. In a blog post, Google said a group of hackers had been involved in a phishing attack earlier this year that had thwarted former US Vice President Joe Biden's presidential campaign. A similar group of hackers from Iran tried to target President Trump's campaign but failed. Google has named this group APT 31 (Advanced Persistence Threat 31). Under this, users are given an email link, which when clicked downloads malware hosted on GitHub. Hackers are then allowed to upload and download files and execute their commands. The group used services such as GitHub and Dropbox to carry out attacks, making it more difficult to track them. Google has also warned that such APTs pose a further threat to the US election. https://blog.google/threat-analysis-group/how-were-tackling-evo

Is there any spyware on your mobile? Be careful.

Image
Is there any spyware on your mobile? Be careful. As people's online activity grows, so does the risk of hacking. It is not known when spyware or malware is installed on the user's device. The important thing to know here is that spyware is also a type of malware. Which leaks important information on the user's device to hackers. This is the kind of thing that keeps spying on your mobile. Not only that, spyware can even install Killer on your device. Which can even steal the username and password of your particular site and app. It also steals login details through keystrokes. It's not easy to find out if your phone has spyware. Spyware is generally classified as adware, tracking cookies, system monitors, and trojans. How to get to the device? Spyware or malware or spy software and apps are usually installed on any device through a single link. Many times such apps are infiltrating the device through a third-party app. When you install an app on a phone, it prompts you t

Chinese hackers spreading undetectable malware for espionage

Image
Chinese hackers spreading undetectable malware for espionage Researchers at cybersecurity company Kaspersky have uncovered an Advanced Persistent Threat (APT) spying campaign that uses a rare type of malware. Kaspersky reports that the Chinese-speaking hacker group has been using rootkits called "MosaicRegressor" for two years to target NGOs and diplomatic missions for espionage campaigns. The researchers said that it would be difficult to detect and remove the malware used for spying in Asia, Africa, and Europe. This malware affects the computer's Unified Extended Firmware Interface (UEFI), which was introduced before the operating system and other programs. This means that no security software or antivirus can detect this malware. However, Kaspersky has stated that this malware is unusual but not unique. The UEFI bootkit component used to insert malicious code into the user's device is based on the vector EDK bootkit. It was created by a hacking team in 2015 and lea

Photos can be a malware attack!

Image
Photos can be a malware attack!  How sensitive are you to the security of your device? If you are very sensitive, you will not open a file or attachment from anywhere so easily. You are always aware of the dangers of various types of cyberattacks such as phishing attacks or scams. Therefore, before opening or downloading a file, you need to make sure at the outset about the person and purpose of sending it. But even if someone sends you a picture, you pay the same attention to Rs Of course, when it comes to photos, you're not so focused on security. Just take the photo lightly and open it. Save to your album. But in reality, it is an unhealthy practice. If those images are also melancholy, the result is just as deadly. It damages your device and steals data. The latest example of this is the Instagram vulnerability revealed by the cybersecurity company Checkpoint this week. In which it was revealed that any crafted picture can hijack the entire Instagram account. However, Facebook