Google Has Removed 17 Suspicious Apps From Google Play Store
Google has removed 17 suspicious apps from Google Play Store. The 17 apps, spotted by security researchers from Zscaler, were infected with the Joker (aka Bread) malware. This spyware is designed to steal SMS messages, contact lists, and device information along with silently signing up...
Bijay Pokharel,
September 27, 2020
1 min read
Windows XP Source Code Allegedly Leaked Online
The source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today. The leak was spread in a thread on the anonymous forum 4chan. Notably, the archive includes the Windows NT 3.5 and original Xbox source code dumps...
Bijay Pokharel,
September 25, 2020
1 min read
How To Hide Your Browsing History From ISPs
our ISP tracks your clicks for a number of reasons. For them, your browsing history is a revenue stream. Many ISPs compile anonymous browsing logs and sell them to marketing companies. Some Internet providers are even moving to make privacy a premium add-on, using your...
Bijay Pokharel,
September 24, 2020
4 min read
Are VPNs Legal Or Illegal?
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Most important, VPN services establish secure and encrypted connections to...
Bijay Pokharel,
September 20, 2020
4 min read
What Is Cyberbullying? And How To Stop It
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms, and mobile phones. It is repeated behavior, aimed at scaring, angering, or shaming those who are targeted.
Bijay Pokharel,
September 18, 2020
8 min read
WordPress Malware Disables Security Plugins To Avoid Detection
Installing a security plugins is the best thing that we do to protect our sites from attacker. But what if an attacker disabled the plugins to avoid detection? According to a post in Sucuri blog, its showing how PHP malware exists which solves this problem...
Bijay Pokharel,
September 11, 2020
3 min read
Microsoft : New Cyberattacks Targeting U.S. Elections
Microsoft has detected cyberattacks targeting people and organizations involved in the upcoming presidential election. Hackers with ties to Russia, China and Iran are attempting to snoop on people and groups involved with the US 2020 presidential election, Microsoft says. “We have and will continue to...
Bijay Pokharel,
September 11, 2020
1 min read
Zoom Has Added Two-Factor Authentication For All Users
Cloud-based video conferencing service ‘Zoom‘ has added two-factor authentication (2FA) support to all user accounts to make it simpler to secure them against security breaches and identity theft. Two-Factor Authentication identifies online users by requiring them to present two or more pieces of evidence, or credentials, that...
Bijay Pokharel,
September 11, 2020
1 min read
What Is Identity Theft? And How To Protect Yourself
Identity theft is the fastest-growing crime around the globe for the very obvious reason that most of us have made our most valuable personal information — name, address, social security number, driver’s license, credit card number, etc. — available online. And cyber criminals are having...
Bijay Pokharel,
September 8, 2020
3 min read
Critical Vulnerability in File Manager Plugin Affecting Millions WordPress Websites
The Wordfence Threat Intelligence team is seeing a dramatic increase in attacks targeting the recent 0-day in the WordPress File Manager plugin. This plugin is installed on over 700,000 WordPress websites, and we estimate that 37.4% or 261,800 websites are still running vulnerable versions of this plugin at...
Bijay Pokharel,
September 7, 2020
1 min read
How to Protect Your Child’s Privacy During Remote Learning
One thing should remain a priority: the overall security of students’ learning experience during the pandemic. For this, many careful and considerable preparations are needed.
Bijay Pokharel,
September 5, 2020
4 min read
Norwegian Parliament Discloses Cyber-Attack On Internal Email System
The Norwegian Parliament (Stortinget) said on Tuesday that it fell victim to a cyber-attack that targeted its internal email system. Attackers have compromised a limited number of email accounts of Norwegian Parliament (Storting) representatives and employees according to Storting’s managing director Marianne Andreassen. In a press...
Bijay Pokharel,
September 2, 2020
1 min read
Good News Shade Ransomware Releases 750k Decryption Keys
The operators behind Shade ransomware took to GitHub this week to announce they had shut down, issued an apology to their victims, and relinquished approximately 750,000 decryption keys in their possession. On Thursday, Kaspersky Lab released an updated decryptor app that includes the newly-released keys...
Bijay Pokharel,
May 1, 2020
1 min read
How To Find Hidden Cameras In Your Hotel Room
If you are staying in a hotel, the last thing you want to think about is that someone may be spying on you. There’s always a need to be alert and mindful in today’s world, and doing so can increase awareness and personal safety.
Bijay Pokharel,
February 22, 2020
4 min read
Recent Posts
Subscribe
Cybersecurity Newsletter
You have Successfully Subscribed!
Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox. You are also consenting to our Privacy Policy and Terms of Use.