The Most Secure Browsers of 2018

There are many things to consider when labeling a browser as secure, such as whether it prevents you from entering a malicious site, blocks automatic malware downloads, is easily exploitable, etc. But how much it respects users’ privacy should also be high on the list. If you are using a browser with top features for protecting you from malicious threats…

Cybersecurity news headlines (January 20 – February 5)

In case you did not keep up with the world of cybersecurity in the past few weeks, we have compiled the biggest news headlines between January 20th and February 5th. There were multiple thefts carried out, we saw the biggest cryptocurrency hack in history and a fitness app revealed the locations of military bases all over the world. Without further…

Remove ChromeSearch Redirect Virus

What is ChromeSearch?
ChromeSearch might look like an ordinary website; however, in reality ChromeSearch is called a browser hijacker because it takes over all the browsers without permission. If a browser hijacker sneaks onto your computer, you will see a new homepage and search engine set on your Internet Explorer, Google Chrome, and Mozilla Firefox browsers. Many users do not even…

Tor proxy service caught stealing Bitcoin ransoms from ransomware creators

Security company Proofpoint has recently noticed that one Tor proxy service has been stealing Bitcoin from ransomware creators by replacing wallet addresses on payment websites, essentially making the situation worse for the ransomware victim. So far, they have stolen $22,000 in ransom money, but since creators are aware of this scheme, they are unlikely to steal more. However, while some…

Cybersecurity news headlines (January 5 – January 20)

In case you did not keep up with the world of cybersecurity in the past few weeks, we have compiled the biggest news headlines between January 5th and 20th. You’ll find a couple of major headlines, such as the US Senate voting in favor of a bill that could allow NSA to spy on citizens without needing a warrant, and…

Flaw in antivirus can be abused to hijack a computer

An Austrian cyber security auditor, Florian Bogner, recently discovered a flaw that allows a local attacker to abuse the ‘restore from quarantine’ feature in antivirus software. The flaw, named AVGater, allows to move malware from an AV’s quarantine folder to a sensitive locations on the victim’s system, allowing the malware to run with full privileges.…

Cybersecurity news headlines (December 15 – January 5)

The past couple of weeks have been pretty mundane when it comes to cybersecurity (not counting the news about ‘Meltdown’ and ‘Spectre’), we have seen worse times, but there have been better weeks. Between December 15 2017 and January 5 2018, arrest in connection to spreading ransomware were made, US officially blamed North Korea for WannaCry, Forever 21’s customer card…

Coin-hive.com – How it works?

What is Coin-Hive.com?
Coin-Hive.com is known to be a currency miner. Specifically speaking, it is a JavaScript library used to mine the cryptocurrency. In most cases, the following cryptocurrencies are mined using it: Monero, Dashcoin, DarkNetCoin, and others. Although this does not sound very dangerous, malware experts have noticed that cyber criminals have started embedding this miner into certain programs and…