APT Increasingly Targets Canadian Orgs

APT Increasingly Targets Canadian Orgs

Canadian organizations are being warned that they are increasingly becoming the targets of cyber-threats, with researchers discovering nearly 100 malicious email campaigns that have been…

View More APT Increasingly Targets Canadian Orgs
China installs spyware on tourists’ Android phones, downloads data from iPhones

China installs spyware on tourists’ Android phones, downloads data from iPhones

Foreigners visiting certain areas of China are having their smartphones searched at the border. With Android phones, authorities install a piece of spyware that has…

View More China installs spyware on tourists’ Android phones, downloads data from iPhones
New Android Spyware Tools Emerge in Widespread Surveillance Campaign

New Android Spyware Tools Emerge in Widespread Surveillance Campaign

Researchers have uncovered a surveillance campaign, dating back to at least 2013, which has used a slew of Android surveillanceware tools to spy on the…

View More New Android Spyware Tools Emerge in Widespread Surveillance Campaign
New Dridex Malware Strain Avoids AV Detection

New Dridex Malware Strain Avoids AV Detection

A new variant of the Dridex banking Trojan has been shaken up with the ability to avoid detection by traditional antivirus products. Dridex is a…

View More New Dridex Malware Strain Avoids AV Detection
What is malware? How to prevent, detect and recover from it

What is malware? How to prevent, detect and recover from it

Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access…

View More What is malware? How to prevent, detect and recover from it
Data breaches cost US companies more than $1.2 trillion last year

Data breaches cost US companies more than $1.2 trillion last year

A data breach can inflict pain on an organization by stealing and leaking sensitive information. With user or customer accounts compromised, a company can suffer…

View More Data breaches cost US companies more than $1.2 trillion last year
Botnet Abusing Android Debug Bridge, SSH is Back

Botnet Abusing Android Debug Bridge, SSH is Back

A new cryptocurrency-mining botnet malware is abusing Android Debug Bridge (ADB) and SSH, according to Trend Micro. “This attack takes advantage of the way open…

View More Botnet Abusing Android Debug Bridge, SSH is Back
Website Attack Attempts Rose by 69% in 2018

Website Attack Attempts Rose by 69% in 2018

Millions of websites have been compromised, but the most likely malware isn’t cyptomining: it’s quietly stealing files and redirecting traffic, a new Sitelock report shows.…

View More Website Attack Attempts Rose by 69% in 2018
NSO Group Impersonated Facebook To Help Clients Hack Targets

NSO Group Impersonated Facebook To Help Clients Hack Targets

Infamous Israeli surveillance firm NSO Group created a web domain that looked as if it belonged to Facebook’s security team to entice targets to click…

View More NSO Group Impersonated Facebook To Help Clients Hack Targets
Process Reimaging: A Cybercrook’s New Disguise for Malware

Process Reimaging: A Cybercrook’s New Disguise for Malware

As of early 2019, Windows 10 is running on more than 700 million devices, including PCs, tablets, phones, and even some gaming consoles. However, it…

View More Process Reimaging: A Cybercrook’s New Disguise for Malware