Security News

Cybersecurity news headlines for August 1-31, 2020

Cybersecurity news headlines for August 1-31 2020
US President Trump has signed an executive order banning viral app TikTok; Microsoft, Walmart and Oracle are trying to buy TikTok’s US operations; and TikTok has sued the US government in response to the ban. Former Uber CSO is being charged for covering up Uber’s 2016 data breach incident. And a hacking group attempted…

Cybersecurity news headlines for July 1-31, 2020

In July’s edition of cybersecurity news headlines, we primarily report on one of the biggest cybersecurity incidents of the year – the Twitter hack. We also discuss CouchSurfing suffering a data breach that exposed information of 17 million users, and countries considering following India’s example of banning viral video sharing app TikTok.…

CCleaner detected as potentially unwanted by Microsoft Defender

Microsoft’s Windows Defender (aka Microsoft Defender) is currently flagging CCleaner’s free version as a potentially unwanted application (PUA).

Popular system optimization tool CCleaner, developed by Piriform and initially released 16 years ago, is now owned by anti-virus vendor Avast. It is the go-to tool for users looking to delete unwanted files, programs and junk, and fix registry problems But it appears…

Emotet is back and is now dropping QakBot banking trojan

After more than five months of inactivity, the Emotet botnet is back in action and is now distributing the QakBot (QBot) banking trojan. Emotet is known as one of the most notorious and most active cyber crime operations. Emotet first emerged in 2014 as a banking trojan that targeted banking credentials but has since evolved into a botnet that allows…

COM surrogate – How to fix it

What is COM surrogate
COM surrogate or dllhost.exe are processes part of the Windows operating system. If you open your Task Manager, you will likely see multiple COM surrogate processes running. This is completely normal. COM actually stands for Component Object Model, and COM object are plugged into other applications in order to extend them. It’s often used to create thumbnail…

Cybersecurity news headlines for June 1-30, 2020

In June’s edition of cybersecurity news headlines, we report on the BlueLeaks data dump, which leaked 269 GB of US police department data; Honda’s cyber attack; and India banning TikTok among other 59 Chinese apps.
Without further ado, here’s what made the biggest headlines in June, 2020.…

Dropbox phishing email – What you need to know?

What is Dropbox phishing email
Dropbox phishing email refers to phishing emails that are made to look like they are sent by Dropbox. The scammers sending out these emails are aiming to hijack accounts by trying to phish login credentials from unsuspecting users. The email basically says that a file has been shared with the recipient, and they need to click…

Android Charging Boost

What is Android Charging Boost
Android Charging Boost refers to the blue screen with ads that appear on Android device screens when there’s a potentially unwanted app (PUA) installed. The blue screen appears when users connect their Android smartphone to the charger. While this random screen with ads may alarm users, it’s nothing overly serious, as long as users don’t click…

2020 Visitor Feedback Survey scam

What is 2020 Visitor Feedback Survey?
2020 Visitor Feedback Survey is an online scam that attempts to trick users into sharing their personal details. The deceptive page is asking you to fill out a short survey and claim a reward. Of course, there is no reward and the only purpose of the survey is to get you to visit an unreliable…

Supreme Court Email Scam

What is Supreme Court Email Scam
Supreme Court Email Scam refers to a scam email that claims to be from UK’s Supreme Court. There a couple of slightly different scam emails that claim to come from the same institution, either carrying an attachment or containing a link. The one with an attached file is carrying the AsyncRAT remote access trojan that…