In a new wave of attacks aimed at unpatched Microsoft Exchange servers, cyber criminals have been actively searching the internet for servers that have not yet been updated with the latest Microsoft critical security updates with the idea to exploit...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
One-Click Vulnerabilities Detected In a Number of Popular Desktop Programs
A number of one-click bugs have been detected in various popular desktop applications such as LibreOffice, Nextcloud, VLC, Bitcoin and Dogecoin Wallets, Telegram, Mumble, and Wireshark. Those vulnerabilities could be used by attackers to execute...
SolarMarker RAT installed through Google Sites
Search Engine Optimization (SEO) techniques are used by hackers to attract corporate users in what seems like a new malware-infecting tactic. Researchers have revealed that over 100,000 fraudulent Google pages that rank as top results thanks to...
100M Devices affected by NAME:WRECK bugs
NAME:WRECK According to researchers, an estimate of over 100 million devices that are connected to the Internet currently possess one or more flaws of a vulnerability class called NAME:WRECK. There is a wide variety of devices that are affected by...
New Zero-Day Exploits discovered on Google Chrome
A new update of the popular Google Chrome web browser has been released by Google for its Windows, Mac, and Linux versions. The update includes patches for two recently found security bugs that are both reportedly exploited in the wild and enable...
The data was already publicly available for Clubhouse users
The Clubhouse statement According to a statement by Clubhouse, there was no breach and the information that was supposedly leaked was already publicly available for Clubhouse users. Clubhouse is an iOS invitation-only social media/chat application...
BRATA Malware is on the Google Play Store once more
The BRATA Malware A new pack of fraudulent Android applications that pretend to be android security scanners has been detected by researchers. The pack of harmful apps has been found in the official Play Store and has been used by malicious actors...
623M Payment Cards data stolen from Cyber card shop
623M credit card data leaked from darknet marketplace Swarmshop, a cyber card shop was recently compromised by hackers who managed to extract user data relating to stolen credit/debit cards and then release it on the Internet. This was reported by...
LinkedIn Data Breach
Personal information containing user profile IDs, e-mail addresses, and other details of nearly 500 million LinkedIn users has appeared online for sale. According to the information that is available, threat actors have scraped data from public...
IcedID Trojan – a replacement to Emotet?
The IcedID Malware A malware named IcedID was discovered to spread through Excel attachments and Excel 4 macros that are sent to the users via malicious emails. The new threat seems to bear similarities and operate in a similar way to the Emotet...