The LockFile Ransomware One of the latest variants of ransomware known as LockFile uses a unique method dubbed “intermittent encryption” to avoid ransomware protection software. The LockFile Ransomware instructions A recent research...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Teens stole a 16.4552 Bitcoin wallet
An interesting court case revealing how two teenagers redirected a 16.4552 Bitcoin wallet worth nearly $773,000 in today’s price came into light. The case reveals how Andrew Schober, a Colorado citizen, got infected with a clipboard hijacking virus...
Cisco APIC critical flaw discovered
Cisco Systems released patches to fix a serious security problem in its Nexus 9000 Series Switches that may be exploited to read or write files on a susceptible system through the Application Policy Infrastructure Controller (APIC) interface. The...
WhatsApp version distributes Triada Trojan
A Trojanized WhatsApp application for Android has been spotted to deliver malware, show full-screen advertisements, and sign up for unwanted subscriptions without the user’s knowledge. In a revelation published on Tuesday, a group of Russian...
38 million sensitive data records exposed from Microsoft’s Power Apps...
Microsoft’s Power Apps portals platform unintentionally exposed online 38 million records from 47 distinct organizations. According to the disclosure that was made public on Monday, the exposed data contains details such as COVID-19 contact...
Microsoft Exchange Server under ProxyShell attacks
A security warning issued by the U.S. Cybersecurity and Infrastructure Security Agency (US-CISO) has announced that the latest “ProxyShell” Microsoft Exchange vulnerabilities are a target of new active exploitation attempts. According to...
The Ficker Stealer malware used for data exfiltration
A new Windows data-stealing cyber threat written in Rust was recently reported. The name of the malware is Ficker Stealer, and it is currently being distributed via Russian forums as malware-as-a-service (MaaS). The virus typically spreads via...
Accenture attacked by LockBit ransomware
Yesterday, LockBit, a ransomware-as-a-service (RaaS) hacker organization, published on its site a post about their most recent attack, which hit the multi-national consulting company Accenture. According to LockBit, the database of Accenture has...
Millions stolen in a hacker attack on Poly Network
One of the largest cryptocurrency heists just took place as hackers have managed to steal the equivalent of $611 million in various cryptocurrencies from the Poly Network, a cross-chain decentralized finance platform (DeFi). Ploy Network reported...
Android FlyTrap trojan hijacking Facebook accounts
Researchers warn about a newly-discovered Android Trojan called FlyTrap that’s capable of taking over Facebook accounts by using fake apps available in the Google Play Store and other third-party Android app stores. The malware is currently active...