Find

July 28, 2021

Cybercriminals may target 2020 Tokyo Olympics, FBI warns

“Adversaries could use social engineering and phishing campaigns in the lead up to the event to obtain access or use previously obtained access to implant malware to disrupt affected networks during the event. Social engineering and phishing campaigns continue to provide adversaries with the access needed to carry out such attacks,” the federal law enforcement agency warned.
by | 2 min read
July 20, 2021

VPN service favored by cybercriminals are forced to shutdown

DoubleVPN’s services were mainly promoted on Russian and English language underground hacking and cybercriminal forums, offering anonymity by hiding the identities and locations of various types of scammers, fraudsters, and even ransomware operators.
by | 2 min read
July 15, 2021

Don’t feed the trolls and other tips for avoiding online drama

The cybercriminals sometimes engage in “trollish” behavior such as posting controversial content. However, their comments are usually accompanied with links masquerading as a “source” that proves their point, but could even be laced with malware.
by | 3 min read
July 14, 2021

Most health apps engage in unhealthy data harvesting habits

Most health apps engage in unhealthy data harvesting habits. As many as 88 percent of almost 21,000 mobile health (mHealth) applications that are accessible on the Google Play Store from Australia include code that can access and even share users’ personal data with third parties, an analysis by the Optus Macquarie University Cyber Security Hub in Sydney has found.
by | 3 min read
June 30, 2021

Gaming industry under siege from cyberattacks during pandemic

Recycling and using simple passwords make credential stuffing such a constant problem and effective tool for criminals. A successful attack against one account can compromise other account with same username and password combination used.
by | 2 min read
June 21, 2021

5 common scams targeting teens – and how to stay safe

With social media being the digital playground for most teenagers, it’s only natural that enterprising fraudsters will try to target them where they spend most of their time.
by | 4 min read
June 13, 2021

BackdoorDiplomacy attacks diplomats in Africa and the Middle East

BackdoorDiplomacy shares tactics, techniques, and procedures with other Asia-based groups. Turian likely represents a next stage evolution of Quarian, the backdoor last observed in use in 2013 against diplomatic targets in Syria and the United States.
by | 2 min read
June 7, 2021

Gamers rejoice as Acer introduces new Predator monitors and accessories

Acer has expanded with three new VESA DisplayHDR™ -Certified models: the Predator CG437K S, Predator X38 S and Predator X28. Acer has also announced new peripherals so as to further enhance the gameplay experience.
by | 5 min read
June 7, 2021

T1 2021 Threat Report on trending vulnerabilities and configuration flaws

SET Research aims to have a triannual publication, For easier orientation, the T1 abbreviation will be used to describe the period from January to April, T2 from May to August, and T3 from September to December.
by | 2 min read
May 30, 2021

Acer ME announces updates to its Predator Triton 300

Acer Middle East has announced updates to its popular Predator Triton 300, Predator Helios 300 and Nitro 5 series of gaming notebooks, all of which have been refreshed to take advantage of the latest 11th Gen Intel® Core™ H-series processors and NVIDIA GeForce RTX 30 Series Laptop GPUs.
by | 5 min read