The ERMAC Malware A new Android banking trojan known as ERMAC, which targets Poland and has roots in the notorious Cerberus malware, has been discovered by ThreatFabric researchers in a recent report. According to the information that is available...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Jupyter Malware has evolved and now it’s delivered through MSI Installers
The Jupyter Malware distribution via MSI installers A .NET infostealer named Jupyter has been tracked by security experts for its propensity to target healthcare and education organizations. The malware seems to be particularly effective at evading...
Apple fixes exploited Zero-Days with Urgent Apple iOS and macOS updates
In addition to extending fixes of previously fixed security vulnerabilities exploited by NSO’s Group Pegasus spying program that targets iPhone users, on Thursday, Apple issued urgent security upgrades to address numerous security flaws in...
Microsoft warns of a broad-scale PHaaS operation
Microsoft has laid the groundwork for a broad-scale PHaaS operation (phishing-as-a-service), which includes the sale of phishing kits and email templates and provides low-cost hosting and automated services that enables cyber actors to buy phishing...
Web hosting provider Exabytes hit by ransomware
Web hosting provider Exabytes is recovering from a ransomware attack, but is still in the process of restoring services. Over the weekend, a ransomware attack struck the Penang-based web hosting provider Exabytes. According to the information that...
Google reset the permissions of billions of unused Android applications
In an announcement made in Friday, Google said that they would be making a feature seen in Android 11 available to Android smartphones running versions 6 and higher. The function resets the permissions that were previously given to applications that...
Hola VPN Chrome extension removed from Web Store because it might contain...
Hola VPN Chrome Extension Two days ago, on the 14th of September, the Google Chrome extension for the popular free VPN service Hola VPN was removed from the Chrome Store, the reason for this being that the extension “might contain malware”. It is...
TTEC Hit By Ransomware
The TTEC Ransomware attack TTEC, a provider of outsourced customer care and sales assistance to some of the world’s biggest companies, is contending with interruptions caused by a network security issue that came about as a consequence of a...
A new ZLoader variant that spreads through fake TeamViewer download ads has...
The ZLoader Malware A recent report reveals that search results for TeamViewer remote desktop software on major search engines like Google and others return malicious URLs that put ZLoader malware on the user’s system. The infection chain is...
Apple Event 2021 September Live Bitcoin Scam
Hundreds of thousands of youtubers are being scammed into participating in a fake September giveaway dubbed “Apple Event 2021”. Multiple fake Youtube channels have popped up today showing an interview with Tim Cook and a fake interviewer...