Security News

Tumblr virus protection tips

Tumbler is a popular blogging and social networking website that allows users to post various content and follow other users’ blogs. As you may already know, the more popular a service is, the more likely its name is to be used by cyber criminals. There are different scams and malicious programs that target Tumbr user accounts aiming to steal personal…

Cybersecurity news headlines by WiperSoft [1-31 July, 2019]

Cybersecurity news headlines  [1-31 July, 2019]
It’s been a while since our last cybersecurity news headline report, but in this July edition we report on a huge data breach involving 5 million Bulgarian citizens, Equifax finally settling for the 2017 data breach, Facebook being fined a record-breaking $5 billion for its inability to protect user data, a Capital One breach compromising…

ICO Hacking 2020

Hacking Bitcoin Mining Pools and Exchanges
Hacking a Bitcoin mining pool can be useful to crooks as the process involves using the processing power of a group of Bitcoin miners for one’s own benefit. However, doing so is a complicated process. The hackers need to target ISPs and compromise the Border Gateway Protocol (BGP) service, which connects different networks. By compromising…

What you need to know about Google Redirect Virus [Removal Guide]

When talking about Google virus, it’s not one specific virus but rather a number of different infections that are mentioned. Google doesn’t have anything to do with the viruses, but cyber crooks like to use the name to make their scams seem more legitimate. The different Google viruses you can commonly encounter include: “You have won a Google gift/Google Membership…

BianLian Android Banking Trojan

What is BianLian Android Banking Trojan?
BianLian Android Banking Trojan is a banking trojan that can steal your banking information. BianLian Android Banking Trojan was initially a pretty minor malware but was recently turned into a banking trojan. It can now lock screens, send messages, inject push notifications, and is able to steal banking credentials. It tricks users into thinking they…

How to remove Android lock screen ads

It seems that nowadays adverts follow us no matter where we are or what we do. Android users are now facing a relatively new problem: unwanted advertising content appearing on the lock screen. The reason behind these ads appearing on Android phones and tablets is most likely an accidentally installed ad-supported application. This article will help you find out what…

Remove Iphone Virus

If you follow news about online threats, you already know that cyber crooks create malicious software for MacOS and iOS in the same way as for other operating systems. Although the number of Internet-based infections targeted towards Windows and Android is higher, Apple users should not feel completely safe either. Knowing this, can help you make sure that you keep…

Cybersecurity news headlines for 1-15 June, 2019

Cybersecurity news headlines for 1-15 June, 2019
In this edition of cybersecurity news headlines, we have three stories to report on. Privacy enthusiasts rejoice as Apple introduces its new “Sign in with Apple” feature; dating app Tinder may be forced to share user data with Russian law enforcement and intelligence agencies; the notorious GandCrab ransomware stops operations.…

Cybersecurity news headlines for May 15-31, 2019

Cybersecurity news headlines for May 15-31, 2019
To continue our May edition of cybersecurity news headlines, we discuss Google’s habit of tracking your purchases and how the company kept unhashed passwords of G Suite users for 14 years, as well as a serious security breach in drive-thru restaurant Checkers.…

Cybersecurity news headlines May 1-15, 2019

Cybersecurity news headlines May 1-15, 2019
In our first May edition of cybersecurity news headlines, there are three stories to report on. We discuss President Putin signing a law to disconnect Russia from the rest of the web; a Twitter bug exposing iOS users’ locations; and a WhatsApp vulnerability that allows attackers to infect devices with spyware by simply calling them.…