Monthly Archives: February 2018

HACKERS SPREAD ANDROID SPYWARE THROUGH FACEBOOK USING FAKE PROFILES

The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almost 2 billion monthly active users on the social media giant Facebook and that … Continue reading

Posted in Uncategorized | Leave a comment

CROWBAR: A TOOL TO PERFORM BRUTE FORCE ATTACKS ON DIFFERENT SERVICES

Crowbar is a tool that is specifically developed to perform brute force attacks during pentesting tests. This tool applies brute force attacks differently than other tools that already exist. Today there is a large number of tools to attack the … Continue reading

Posted in Uncategorized | Leave a comment

HOW TO HACK USING PARAT- REMOTE ACCESS TROJAN (RAT)?

According to cyber security specialist; a Remote Access Trojan (RAT) is a type of malware that controls a system via a remote network connection as if by physical access. While desktop sharing and remote administration have many legal uses, RAT is usually … Continue reading

Posted in Uncategorized | Leave a comment

PYMES EUROPEAS PAGARON CASI $100 MILLONES POR RANSOMWARE EN 2017

Las PYMES europeas se vieron obligadas a pagar casi $100 millones para recuperar el acceso a computadoras bloqueadas, ya que un ransomware continuó atacando en la región el año pasado, según un informe de una empresa de seguridad informática. Una … Continue reading

Posted in Uncategorized | Leave a comment

A SECURITY BREACH AFFECTS MORE THAN 300.000 MICROS POS ORACLE SYSTEMS

Cybercriminals have found a new security flaw that they can exploit to install POS malware in Oracle Micros’ point-of-sale systems. Oracle has already issued updates for this problem. However, this will take months until the patch reaches the affected POS … Continue reading

Posted in Uncategorized | Leave a comment