One of the most popular Operating systems around the internet, Microsoft Windows, is know well known among developers, security researchers, attackers to test, build and execute their strategies. The most sophisticated reason for this is that, for over 2 decades, Microsoft has billions of users from tech as well as non tech background. The company has worked well on its vulnerabilities, loopholes and provide timely updates to its users that helps them to be in sync with the internet and has protected them from greater damages. When it comes to security of windows operating system, it has a well known feature named Windows Defender. There is no doubt on the…
-
-
OPERATION EPIC MANCHEGO- MALDOCS DELIVERING EPIC INFOSTEALERS
At some point in our life, we all come across some leadership responsibilities. For a leader, the most important characteristics is to get himself updated with his user’s data in order to analyze and increase their efficiency. Thus, a leader has to maintain a proper database that has both integrity and authenticity. These two features of a database determine its strength and lifeline. Popular for some past years, Microsoft’s Excel Spreadsheets are one of the most common utility used by many officials and staffers in every sector. From tourism to IT industry, every organization from different industries maintain several databases. In case of large and dynamic records, there is a…
-
MEET THE YOUTH MRBMINER. A TROJAN WHICH HAS ALREADY MINED MONERO FROM THOUSANDS OF SERVERS.
If we ask today’s youth, “What they like?”, the answer will be short and damn “fame”. Every youth in today’s time has a clear goal in his/her mind that he/she has to earn fame, but they don’t know what path to choose. Some may choose ethical and some may unethical. But adults knows this fact that fame comes from experience and hard work. Therefore, it is said that “Old is Gold”. In the past, we have covered articles many articles based on trojans that mines cryptocurrency from the systems. Today, we will talk about trojans from the same family but a youth from that family. Why we said youth? As…
-
VULNERABILITY IN VISA CONTACTLESS CARD TRANSACTIONS COULD ALLOW HACKERS MAKE MILLIONS WITHOUT ANY ACTION
In last 6 months, COVID-19 has make all of us to believe on the fact that no surface is absolutely safe to touch. As a result, people had to adopt new normal in order to survive and earn living. Welcoming this new normal, we all have learnt to abide on two most important rules which are: Social distancing. Conduct contactless meetings as much as possible. Therefore, anyone who has still not adopted the new normal is considered to be of no use by the society. If we talk about new normal in context to payments and transactions, obviously cashless or plastic payments have become the priority over cash payments. From…
-
WELCOME THE NEW CRYPTOJACKING WORM “CETUS” FOR DOCKER DAEMONS
As technologies are getting more advanced, virtuality is becoming more friendly to human beings and when the word “virtual” comes, one word that comes into every tech geek’s mind is that of “Cloud Computing”. In today’s time , every second startup is dependent on cloud infrastructure instead of renting servers as: Cloud infrastructure helps an organization to grow more with less number of employees. It also helps to get advantage of more resources in less cost. There are many other factors that overpower cloud computing to that of physical infrastructure but yes there are many IT companies out there who still uses their own physical infrastructure. Great Deal for Cloud…