The Cyclops Blink Botnet A new report by Trend Micro has revealed that the Cyclops Blink botnet is targeting ASUS routers. According to the research, the complex modular botnet, which is written in the C programming language, affects a variety of...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Popular software packages with multiple security vulnerabilities
Security flaws have been discovered in prominent package managers that might be exploited to execute arbitrary code and access sensitive information, such as source code and access tokens. However, in order for the vulnerabilities to be exploited...
How to find out if your WhatsApp has been compromised?
How to know if WhatsApp is hacked? A new collaboration project between WhatsApp and Cloudflare has started, aimed at improving user security by helping validate the authenticity of the desktop browser apps for the WhatsApp messaging service. The...
Mozilla Firefox fixes two exploited zero-day vulnerabilities
The Mozilla Firefox Zero-day Vulnerabilities On Friday, Mozilla released a security advisory with an urgent update of two high-impact security vulnerabilities in its Firefox web browser that it claims are being actively exploited in the wild. The...
The DLSS source code of NVIDIA leaked as part of cyberattack
U.S. chipmaker NVIDIA announced on Tuesday that a cyber intrusion on the company’s network had exposed sensitive material, including source code supposedly related to its Deep Learning Super Sampling (DLSS) technology. In a security advisory, NVIDIA...
Cyberattacks against the video game sector increasing
During the pandemic lockdowns, web application attacks on the worldwide video game business have risen by 340 percent. Fifty-nine percent of all gaming sector attacks reported in 2020 have come through web application attack vectors, according to...
Iranian hackers are employing new spyware that targets Telegram Messenger API
An Iranian geopolitical nexus threat actor deployed two new targeted malware with basic backdoor features as part of an attack on an unidentified Middle Eastern government body in November 2021. According to cybersecurity firm Mandiant, an...
DeadBolt ransomware attacks Asustor NAS
The DeadBolt Ransomware A DeadBolt ransomware attack targeting Asustor NAS devices has been reported on Reddit and the official Asustor forums by users who have purchased their devices from Asustor. It has been known for some time that DeadBolt is...
The Hive Ransomware’s master key retrieved by exploiting a flaw in the...
The Hive Ransomware Master key A group of academics from South Korea’s Kookmin University have published a new paper explaining the encryption process of the infamous Hive Ransomare. The study also reveals the “first successful...
VMware Horizon Log4j Flaws Targeted With Ransomware
The VMware Horizon Log4j vulnerability In an effort to infect unpatched VMware Horizon servers with ransomware, a “potentially harmful actor” affiliated with the Iranian government is aggressively exploiting the well-known Log4j...