Cryptocurrencies

3 Hacker-Proof Tips You Need to Know to Secure Your Cryptocurrencies

Investing in cryptocurrencies has become a worldwide phenomenon over the last couple of years. You talk to any investor and the first thing they will say is how profitable the crypto industry has become. However, the biggest...
Cryptocurrency Mining Malware This article is cornerstone content

Hackers Abusing Apache CouchDB Vulnerabilities to Deploy Malware & Mining Monero Cryptocurrency

Cryptocurrency Mining Malware performing a crypto mining attack by exploiting the vulnerabilities in the popular database system. According to their global Sensor reports the new attacks targetting the vulnerabilities in the popular open source database Apache CouchDB system. Past few year Crypto currency...
Cryptocurrency Malware

Over 1.65 Million Users Infected By Cryptocurrency Malware Miners In 2017

Malware miners are in the raise starting from this year, attackers using various social engineering and more sophisticated attacks such as EternalBlue Which results in attackers getting cryptocurrency Malware, while their victim's computer systems experience a dramatic slowdown due...
Mac Malware

Mac Malware Steals Cookies & saved Passwords when Users Visiting Crypto Exchange Service Websites

A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers. "Web cookies are...
imagegate

ImageGate attack – Malware through poisoned .JPG

ImageGate attack : Security people from Check Point Software Technologies identified a new malware  campaign through Facebook. Crooks leverage an image obfuscation trick, dubbed ImageGate, to spread the Locky ransomware via Facebook. Experts highlighted that the image obfuscation trick is able...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security