• Security

    Protect your Android phone from malware

    Want to protect your Android phone from malware? Stop the flow of annoying ads, do you want to protect your information from hackers? That is, we will see how to prevent these and how to deal with a malicious app. You need to be tactful to detect Android malware For example, a mobile app called Ads Blocker has been advertised as a useful service to cut down on annoying mobile ads, and may pop up to cover your screen as you prepare to enter something important. But according to security researchers, the mobile app was actually malware and provided more ads. Malware is often harvested by fake clicks on advertisements,…

  • Security

    Clear the web history from the browser but clear it from the internet?

    You have seen so many memes that if I die, delete my history. No matter how well you use the internet, you can find strange things in your history that make anyone look weird about you. That’s why you don’t want anyone else to see your web history. But have you ever wondered if your web history is really deleted when you delete it from your browser? From the late nineties to the present day, the Internet has become a part of everyday human life. In 2000, about 7% of the world’s population used the Internet, but today 55% of the world’s population, or more than half, use the Internet…

  • Security

    Avoid using pirated apps, a new ransomware called EvilQuest for MacOS

    We all know what ransomware is. One of the worst malware currently available is a ransomware from cryptovirology. Researchers at K7 Computing, a global cybersecurity firm, have identified a new ransomware targeting Apple macOS users through pirated apps called ‘EvilQuest’. This is the second ransomware identified by K7 since the fileless trojan was detected last December. Usually a ransomware encrypts the user’s files and requests a ransom to decrypt those files. Most people ask for it through Bitcoin. But this ‘EvilQuest’ ransomware goes a step further and installs a keylogger and records the user’s keystrokes. A keylogger is a reverse shell that allows an attacker to run custom commands. This…

  • Security

    The FBI says online banking apps could be a major security threat

    These days, cybercriminals are increasingly targeting cybercriminals to steal mobile banking users’ account information, according to a new FIB warning. The Center for Internet Crime Complaint Center (IC3) has issued a warning that in the event of an epidemic, mobile banking may attempt to exploit more targeted users of online banking applications. As banks closed while U.S. cities were locked up, Americans relied on mobile banking apps for payments, exchange funds, and cash checks. In fact, a study of U.S. financial data shows that mobile banking usage has increased by 50% since the beginning of this year. The FBI believes cybercriminals may use fake banking applications and banking Trojans to…

  • Security

    Manufacturers’ changes to the OS to include a custom UI and bloatware threaten the security of Android phones

    A new study has warned that customization of core operating system files created by some Android smartphone makers could pose a number of security threats. Research by UK security firm F-Secure has revealed that pre-loaded applications with custom Android UIs have been implicated in research using several major smartphones, including the Samsung Galaxy S9, Huawei Mate 9 Pro and Xiaomi Mi 9. Depending on the geo-location of the custom UI users, they may have different effects. However, these modifications can enter the installed application and cause gaps or errors that can directly affect the device. 1. This ransomware software pretends to be the FBI and tries to extort money from…

  • Security

    Online Privacy

    How much do you care about your privacy? Let’s start like this. Suppose you received a letter in the mail. When you receive the letter, you see that someone has broken the letter and read it. Obviously you know that someone broke the letter and read it to you earlier. What do you think then? Feeling happy? “Someone else broke the letter to me and read it to me, Shoi.” Do you think Regardless of the content of the letter, is it gratifying to know that someone has read it? Well, let’s just say it’s an unimportant letter that someone else reads. But what if the next letter you receive…

  • Security

    What is a Data Breach?

    A data break is when a computer system receives information from the system without the permission of the owner. User does not know anything here until the system owner says something like this has happened. Sometimes the system owner is the same as the user. That means your personal computer will be hacked and you will be the system owner as well as the account owner. But if the banking system is hacked then the bank is the system owner and you are the only account owner there. A Data Breach is simply access to information without authorization. The type of information to get depends on the data Breach target.…

  • Security

    Keylogger Trojan

    Keylogger Trojan virus is a program to log keystrokes. The dangerous thing about this is that we log in with passwords and usernames that we enter. A Trojan keylogger is installed with a regular program without the user knowing. These Trojan keyloggers are also known as keystroke malware, keylogger viruses and Trojan horse keyloggers. Some businesses use this type of program to track the computer usage of employees who log keystrokes and monitor internet activity. These are technically keyloggers but not malicious. What does this Keylogger Trojan do? A keylogger monitors and logs every keystroke it can identify. Then store locally to share to hacker physically or online. Keylogger can…

  • Security

    The app is hacked due to poor security of TikTok

    TikTok is one of the best platforms used by many people around the world to easily share their various videos, because this app allows us to easily use everything we need to complete a video, such as record and edit. Because there is. Because of this, TikTok has become one of the fastest growing social media platforms in recent years. However, no matter how popular it is, there is definitely something wrong with any system. And hackers are looking to take advantage of this. It has now been revealed that the TikTok App will replace a video that has already been uploaded by a user to a hacker or someone…