Digital crimes are a threat to virtually every productive sector worldwide. Just as they empty people's bank accounts, steal personal data, and impersonate others, hackers are finding new ways to affect sectors such as industry, healthcare, manufacturing, education, telecommunications, and supply…
Read More...
Browsing Tag
malware
Online file converters are used for scams and information theft
Online file conversion programs could be used to commit scams, steal information, spread infected files or use data for illicit purposes, according to a recent FBI warning.
The US security agency has issued an alert in this regard,…
ESET Venezuela: 15 years as a benchmark in cybersecurity
ESET, one of the leading companies in computer security worldwide, celebrated 15 years in the country with a Technological Breakfast aimed at specialized media and communicators. The event served as a platform to address crucial issues such…
The dangers of malicious advertising in seasonal sales
The proximity of Black Friday encourages consumers' enthusiasm for the infinite variety of offers around the world. Online shopping is the delight of cybercriminals, who have already deployed false campaigns to trap their victims.
False…
ToxicPanda malware attacks Android devices
The cybersecurity company Cleafy detected attacks by the ToxicPanda malware on Android phones in Spain, Portugal, Italy and Peru.
More than 1,500 users worldwide had their banking data stolen through the infiltration of this malicious…
Malware bank frauds in Latin America increased 113 % in one year
Bank fraud through malware in Latin America increased rapidly in one year, reaching 113 %. Victims, who have lost millions of dollars in these illegal acts, already have laws that force banks to reimburse in countries such as Chile and…
Five applications from the Google Play Store for Android hide malicious software
Cybercriminals have used the Google Play Store, which generates so much trust among users, to release malware through applications that hide spyware.
Recent information indicates that five Android applications contain this type of software…
Data loss or unauthorized access has devastating effects
Data is the most valuable asset for companies and organizations, as it contains privileged information about customers, business strategies, research, technological developments and much more. Hence, the loss or unauthorized access to this…
Influencers under cyberattack: Ways to protect themselves and good practices to consider
Facebook, YouTube and Instagram have become platforms that literally catapulted certain people to stardom, granting them the accolade or recognition of “Influencers.” The number of followers they garner and the money that moves around them…
Prevention: Having multiple backups of your data should be a priority for companies
Cyberattacks, data privacy and the real possibility of creating Deep Fakes are major concerns today for both companies and individuals. Artificial Intelligence (AI), which helps advance so quickly in various subjects and areas, also has its…
Fake Chrome and Safari updates download AMOS malware
Fake application and server updates are causing havoc among Internet users. Cybersecurity researchers have unveiled malicious campaigns that release the AMOS (Atomic Stealer) malware by downloading fraudulent Chrome and Safari updates.
One…
Fake Skype app steals cryptocurrency and user data
A recent report on cybersecurity from the firm specialized in the area Blockchain SlowMist confirms the existence of a fake Skype application so dangerous that it can steal user data by monitoring the equipment, in addition to stealing…