Zephyrnet Logo

Tag: malicious actors

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them

The post Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone appeared first on WeLiveSecurity

Hodlers beware! New malware targets MetaMask and 40 other crypto wallets

Users have been warned against a new malware designed to steal crypto from browser extension wallets such as MetaMask and Coinbase Wallet.

Internet Computer To Launch ETH, BTC Integrations By Year-End

Internet computer to launch BTC and ETH integrations by the end of the year and they can displace the need to use a bridge that can open the network for malicious actors so let’s find out more in our latest cryptocurrency news. The Internet computer to launch these integrations that were mentioned in a roadmap […]

Apple Pays $100,500 Bounty to Hacker Who Found Way to Hack MacBook Webcam

Apple last year fixed a new set of macOS vulnerabilities that exposed Safari browser to attack, potentially allowing malicious actors to access users' online accounts, microphone, and webcam. Security researcher Ryan Pickren, who discovered and reported the bugs to the iPhone maker, was compensated with a $100,500 bug bounty, underscoring the severity of the issues. By exploiting a chain of

DeepDotWeb News Site Operator Sentenced to 8 Years for Money Laundering

An Israeli national was sentenced to 97 months in prison in connection with operating the DeepDotWeb (DDW) clearnet website, nearly a year after the individual pleaded guilty to the charges. Tal Prihar, 37, an Israeli citizen residing in Brazil, is said to have played the role of an administrator of DDW since the website became functional in October 2013. He pleaded guilty to money laundering

Market Analysis Report (28 Jan 2022)

$8 Billion Flushing Bank to Offer Bitcoin Services | Fidelity Files to Launch ETF Tied to Metaverse | Draft Bill Could Let U.S. Treasury Block International Crypto Transactions

Widespread FluBot and TeaBot Malware Campaigns Targeting Android Devices

Researchers from the Bitdefender Mobile Threats team said they have intercepted more than 100,000 malicious SMS messages attempting to distribute Flubot malware since the beginning of December. "Findings indicate attackers are modifying their subject lines and using older yet proven scams to entice users to click," the Romanian cybersecurity firm detailed in a report published Wednesday. "

Chainalysis report reveals an uptick in money laundering via crypto.

Since crypto has become more mainstream, there has been one issue of ill or another in the sector. This shows that some traders’ concerns about entering the market are valid. Despite a widespread clampdown on these malicious actors, they always find a new way to reinvent themselves. This is highlighted in the latest Chainalysis report, […]

ETH Foundation Removes All References to ETH1 And ETH2

The ETH foundation removes all references to ETH1 and ETH2 to save all future users from navigating a confusing model as we can see more in today’s latest Ethereum news. The ETH foundation removes all references to eth1 and ETH2 in favor of calling the blockchain an execution layer and upgraded the proof of stake […]

Worst Data Security Threats Remote Workers Can’t Ignore

Data security is becoming a greater concern for companies all over the world. The pandemic has contributed to these issues. A number of hackers started targeting companies for data breaches during the pandemic, partly because so many employees were working remotely. The frequency of data breaches is not likely to subside anytime soon. Many companies […]

The post Worst Data Security Threats Remote Workers Can’t Ignore appeared first on SmartData Collective.

Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm

Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target

Hackers Creating Fraudulent Crypto Tokens as Part of ‘Rug Pull’ Scams

Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from unsuspecting users. The instances of token fraud in the wild include hiding 99% fee functions and concealing backdoor routines, researchers from Check Point said in a report shared with The Hacker News. Smart contracts are programs stored on the

Latest Intelligence

spot_img
spot_img