Attackers Using Phishing Apps to try to Steal Credentials to Popular Mobile Payment Platforms

phishing app mobile payment app

As versatile installment stages turn out to be more well known, con artists are paying heed to this uptick in advanced money trade. Fake Android applications have been found on the Google Play Store that stance as well known versatile installment stages.

Specialists from security firm PhishLabs found 11  of these phishing applications since the start of 2016 facilitated on the Google Play store.

Continue reading “Attackers Using Phishing Apps to try to Steal Credentials to Popular Mobile Payment Platforms”


Ransomware – What Can You Do About It

Ransomware what can you do

Vindictive programming that utilizations encryption to hold information for payment has turned out to be uncontrollably effective in the course of the most recent couple of years. The reason for this product is to blackmail cash from the casualties with guarantees of reestablishing encoded information. Like other PC infections, it as a rule discovers its direction onto a gadget by misusing a security opening in helpless programming or by deceiving some individual into introducing it. Ransomware, as it is known, now scores prominent casualties like healing facilities, state funded schools and police offices.

Continue reading “Ransomware – What Can You Do About It”

Variant of Android Ransomware Uses Shady Tactics to Trick Users Into Giving Away Administrator Rights

Symantec has found a variation of Android ransomware that utilizations clickjacking strategies to attempt and trap clients into giving the malware gadget head rights.. And additionally scrambling documents found on the bargained gadget, if manager rights are gotten, the malware can then bolt the gadget, change the gadget PIN, and even erase all client information through a processing plant reset.


Ransomware Extortion Methods

Ransomware has various intends to blackmail casualties. In most regular cases, once a client has downloaded and introduced a fake or “Trojanized” application, the malware then bolts the screen, encodes the information and afterward shows a fake alarm, guaranteeing the client had gotten to taboo materials. In this specific case, the malware will likewise assemble the traded off client’s contact list. Clients will then be incited to pay a payment, debilitated by the loss of the encoded information and the accommodation of the client’s searching history to every one of their contacts.

Continue reading “Variant of Android Ransomware Uses Shady Tactics to Trick Users Into Giving Away Administrator Rights”

13 Million MacKeeper User Accounts Exposed


Prior this week, white hat hacker Chris Vickery reported that he could access more than 13 million MacKeeper client accounts. A weakness was misused in the organization’s servers, which uncovered the usernames, email addresses and other individual data of 13 million clients. Since the organization forms charge card installments through an outsider, no monetary data was uncovered. Vickery advised the organization of the security opening, and did not discharge any of the information found to the general population. The organization said in an announcement that it settled the bug inside hours of its revelation.

Continue reading “13 Million MacKeeper User Accounts Exposed”