crypto

For those who are unfamiliar with typosquatting, this criminal activity is quite worrisome. It usually revolves around an individual – or a group of individuals – who register domain names which closely resemble existing platforms. For example, they would register Coinbasee.com if it were available and use that domain as a wayRead More →

ASEF

Researchers discovered a new Android Trojan using a novel Accessibility-abusing technique that targets the official PayPal app, and is capable of bypassing PayPal’s two-factor authentication. There is a new Trojan preying on Android users, and it has some nasty tricks up its sleeve. First detected by ESET in November 2018,Read More →

RansomeWare

Cybercrime is very much a psychological game and ransomware is no exception. Psychology plays a major role in nearly all aspects of ransomware from the instant an attack is launched, to the moment the victim pays—or sometimes refuses to pay—said ransom. The Psychology of Ransomware Distribution Ransomware is mainly distributed through instant messages,Read More →