You were not alone; Twitter went down everywhere

If you were wondering what’s going on with the social media giant Twitter, then don’t worry you were not alone. Reports indicated that Twitter was down in the United States, United Kingdom, Spain, the Netherlands, Japan, Italy, and France, etc.

Thos…

WannaCry Ransomware Attackers are sending new message to victims

The WannaCry ransomware attack is still infecting unsuspecting users, hospitals, and businesses around the world. While some users on Twitter are claiming they have already paid victims a massive amount of ransom money and are still waiting for the d…

Zomato Hacked; 17 Million Accounts Sold on Dark Web

Since 2015 the Dark Web marketplaces have been flourishing. From drugs, weapons, databases, fake documents to all sorts of illegal stuff are available for anyone at anytime. Recently, HackRead found out a vendor going by the online handle of “nclay” …

CryptoMining malware Adylkuzz using the same vulnerability as WannaCry

It seems that WannaCry had a predecessor that apparently carried out attacks which involved mining the cryptocurrency Monero using the same vulnerability found in Windows’ Sever Message Block (SMB) protocol.

Adylkuzz – another NSA enabled malware: A…

ExtraTorrent permanently down;

The world renowned torrenting platform ExtraTorrent (ET) has been shut down on permanent bases. The announcement came just a few minutes ago when users visiting the site saw a brief message on its home page stating that ExtraTorrent along with all of…

Chrome vulnerability can allow attackers to steal user credentials

Google Chrome may not be as safe as it was thought to be. Recently, a security engineer, Bosko Stankovic, found a vulnerability in Google Chrome that hackers can easily exploit to get a user’s credentials such as their username and password and poten…

Layered Database Security in the age of Data Breaches

We live in a time of daily breach notifications. One recently affected organization in Germany put out a statement which said: “The incident is not attributable to security deficiencies.” and “Human error can also be ruled out.” They went on say that …

OUTSMARTING THIEVES: Some are not as sophisticated as you might think!

Taking a close look at ways to keep your family safe and protect what is important to you. Part 5 of a 5-part series. Protecting the things that are important to you can seem daunting. But keep in mind, some thieves trying to steal from you aren’t really all that sophisticated. In fact, sometimes, they […]

The post OUTSMARTING THIEVES: Some are not as sophisticated as you might think! first appeared on ProSec Integration, LLC.