A Trojanized WhatsApp application for Android has been spotted to deliver malware, show full-screen advertisements, and sign up for unwanted subscriptions without the user’s knowledge. In a revelation published on Tuesday, a group of Russian...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
38 million sensitive data records exposed from Microsoft’s Power Apps...
Microsoft’s Power Apps portals platform unintentionally exposed online 38 million records from 47 distinct organizations. According to the disclosure that was made public on Monday, the exposed data contains details such as COVID-19 contact...
Microsoft Exchange Server under ProxyShell attacks
A security warning issued by the U.S. Cybersecurity and Infrastructure Security Agency (US-CISO) has announced that the latest “ProxyShell” Microsoft Exchange vulnerabilities are a target of new active exploitation attempts. According to...
The Ficker Stealer malware used for data exfiltration
A new Windows data-stealing cyber threat written in Rust was recently reported. The name of the malware is Ficker Stealer, and it is currently being distributed via Russian forums as malware-as-a-service (MaaS). The virus typically spreads via...
Accenture attacked by LockBit ransomware
Yesterday, LockBit, a ransomware-as-a-service (RaaS) hacker organization, published on its site a post about their most recent attack, which hit the multi-national consulting company Accenture. According to LockBit, the database of Accenture has...
Millions stolen in a hacker attack on Poly Network
One of the largest cryptocurrency heists just took place as hackers have managed to steal the equivalent of $611 million in various cryptocurrencies from the Poly Network, a cross-chain decentralized finance platform (DeFi). Ploy Network reported...
Android FlyTrap trojan hijacking Facebook accounts
Researchers warn about a newly-discovered Android Trojan called FlyTrap that’s capable of taking over Facebook accounts by using fake apps available in the Google Play Store and other third-party Android app stores. The malware is currently active...
India’s Koo the popular twitter-like app is vulnerable to critical worm...
A major security vulnerability was recently discovered in Koo, an India-developed Twitter-like service. As per the available details, the vulnerability could have been used to install and execute arbitrary JavaScript code on hundreds of thousands of...
Cisco fixes Small Business VPN router vulnerabilities with Critical security...
The critical security patches Serious vulnerabilities have been discovered in Cisco Small Business VPN routers, which may be exploited by a remote attacker to install malware and crash the device. These vulnerabilities exists in the web-based...
Numerous industrial control devices at risk due to critical flaws in embedded...
The INFRA:HALT vulnerabilities 14 vulnerabilities affecting a widely used TCP/IP stack were disclosed to the public on Wednesday. Codenamed “INFRA:HALT” , the flaws put at risk millions of Operation Technology devices in industries like...