Social Networks

New Spy Banker Trojan Telax exploits Google Cloud ServersNew Spy Banker Trojan Telax exploits Google Cloud Servers

New Spy Banker Trojan Telax exploits Google Cloud Servers

Security firm Zscaler discovered a malicious campaign based on a new strain of the Spy Banker banking malware. Security experts…

9 years ago
Beware fake LinkedIn profiles, threat actors are using them to hack youBeware fake LinkedIn profiles, threat actors are using them to hack you

Beware fake LinkedIn profiles, threat actors are using them to hack you

According to the Symantec firm, a growing number of threat actors in the wild are targeting professionals on LinkedIn with…

9 years ago
Twittor tool uses Twitter direct messages to control botnetsTwittor tool uses Twitter direct messages to control botnets

Twittor tool uses Twitter direct messages to control botnets

Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is…

9 years ago
Facebook is testing Self-Destructing Messages for Messenger AppFacebook is testing Self-Destructing Messages for Messenger App

Facebook is testing Self-Destructing Messages for Messenger App

Facebook is testing a Self-Destructing Messages for its Messenger, at the moment the feature is available for some users in…

9 years ago
Facebook. Beware state-sponsored hackers are trying to hack you!Facebook. Beware state-sponsored hackers are trying to hack you!

Facebook. Beware state-sponsored hackers are trying to hack you!

Good news, starting today, Facebook will notify you if they believe state-sponsored hackers are trying to compromise your account. Facebook…

10 years ago
Iranian Cleaver hackers exploit LinkedIn for cyber espionageIranian Cleaver hackers exploit LinkedIn for cyber espionage

Iranian Cleaver hackers exploit LinkedIn for cyber espionage

The Cleaver group is once again in the headlines managing a well-developed network of fake LinkedIn profiles for cyber espionage…

10 years ago
Discovered a Reflected Filename Download flaw in LinkedInDiscovered a Reflected Filename Download flaw in LinkedIn

Discovered a Reflected Filename Download flaw in LinkedIn

The Security researcher David Sopas at WebSegura discovered a Reflected Filename Download vulnerability in the popular professional social network LinkedIn. He…

10 years ago
Fake recruiters on LinkedIn spy on security expertsFake recruiters on LinkedIn spy on security experts

Fake recruiters on LinkedIn spy on security experts

Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A…

10 years ago
How Hackers Could takeover Facebook business pagesHow Hackers Could takeover Facebook business pages

How Hackers Could takeover Facebook business pages

The Indian security expert Laxman Muthiyah discovered a way to hack any Facebook Business Page with a simple trick. Look…

10 years ago
Facebook API flaw Left 1.44 Billion Users’ Identities at riskFacebook API flaw Left 1.44 Billion Users’ Identities at risk

Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users…

10 years ago