What is Online Skimming and How to Avoid It
Card skimming, implemented through card reading slips on ATM machines, is familiar to many. Nowadays this type of credit card fraud is also appearing on the web. Of course, it is improved and adapted according to its new ‘habitat’. But the crux of the matter remains the same: the theft of credit card information for its use in criminal undertakings. On the web, harmful Javascript code effectively replaces the skimmers on the...
Ransomware – to Pay or Not to Pay
Just recently, a new “creative” ransomware called CryptMix revealed itself in the malware family. The ransomware promises its victims to transfer their money to a children’s charity. This statement might seem like a funny joke, but most likely the victims of this virus deprived of an access to their files do not consider it funny at all. Moreover, so far it is impossible to decrypt the CryptMix with modern decryption...
Was the NASA Hack Real and What It Has Taught Us
Like everyone, hackers are looking for their moment of glory. Perhaps, this explains their constant interest in the well-known and big names: CIA, Pentagon, White House… And not so long ago the NASA’s turn has come. Apparently, not for the first time. The group of hackers AnonSec, which includes representatives of different countries, states that the hack occurred as far back as spring 2015. But they’ve managed to get this...
Mobile Banking Trojan Acecard – All You Need to Know About a New Threat
The smartphone has a wide range of functions. Despite its main feature of being a phone, this gadget allows you to listen to the music, read, surf the Internet, pay bills, work with documents, etc. A huge part of personal and business life of our contemporaries is tied to this smart device. Realizing this, the hackers began to concentrate their efforts on creating mobile malware programs. Many of them have already been discovered:...
The Most Prominent Data Leaks of 2015
In 2015, we faced many ambitious and controversial data leaks. Thus, we can mace a conclusion: hackers are becoming more sophisticated while users are still imprudent and careless. The recollection of the most striking cases of information security breaches can help us to understand the most common ways of data leaks. As well as how to organize our data protection systems to avoid material and reputation losses. Large-scale data leaks...