World’s largest professional network LinkedIn That has more than 500 Million Registered users and LinkedIn messenger Platform Vulnerability Allows attackers spread Malware into victims by taking advantage of LinkedIn’s security restrictions Flow. LinkedIn messenger is the Mostly used Future Platform which helps to professional to Share their skills, Messenger easily send resumes, transfer academic research and share job descriptions from the LinkedIn community. Normally,LinkedIn security restrictions scan...
Read More
The Department for Transport and the Centre for Protection of National Infrastructure (CPNI) created the recommendations so that organizations can use them to build safer, more secure cars as smart technology continues to evolve. Known collectively as “the key principles of vehicle cyber security for connected and automated vehicles,” the guidelines consist of eight security best practices that organizations in the automotive sector are expected...
Read More
Throughout the years, banks have expanded their services by offering an ever-evolving set of online capabilities. As a result, financial institutions have become an obvious target for cybercrime and have been quick to deploy various layers of protection to keep their customers safe. Many cybercriminals operate like startup companies, consistently evolving methodologies and tools, and then measuring their return on investment (ROI). With banks adapting...
Read More
The developer of a very popular Google Chrome extension has regained access over his tool after an unknown hacker had managed to hijack his developer account and push a malicious version that contained adware. The extension’s name is Web Developer, a tool developed by Chris Pederick, Director of Engineering at Bleacher Report. The extension overlays a popup with various debug tools that developers can use...
Read More
Cerber ransomware has acquired the reputation of being one of the most rapidly evolving ransomware families to date. Just in May, we pointed out how it had gone through six separate versions with various differences in its routines. Several months later and it seems to have evolved again, this time adding cryptocurrency theft to its routines. This is on top of its normal ransomware routines,...
Read More