Off-Facebook Activity – New Facebook Tool Let you See Which Apps and Websites Tracked you

off-Facebook activity

Facebook introduced a new tool dubbed off-Facebook activity to control and view the apps and websites that send information to Facebook about your interest and activity. This tracked information allows social media networks to push targeted ads based on user browsing habits. With the new tool users, you can see hundreds of websites and apps […]

The post Off-Facebook Activity – New Facebook Tool Let you See Which Apps and Websites Tracked you appeared first on GBHackers On Security.

Read more

Russian Hacking Group Targeting Banks Worldwide With Evolving Tactics

Silence APT, a Russian-speaking cybercriminal group, known for targeting financial organizations primarily in former Soviet states and neighboring countries is now aggressively targeting banks in more than 30 countries across America, Europe, Africa, and Asia. Active since at least September 2016, Silence APT group’s most recent successful campaign was against Bangladesh-based Dutch-Bangla

Read more

Malware-as-a-service – Adwind Malware Attack Utilities Industry Via Weaponized PDF File

Malware-as-a-service – Adwind Malware Attack Utilities Industry Via Weaponized PDF File

Researchers discovered a new wave of a phishing campaign that bypassing the Microsoft APT protection and delivery the Adwind malware via weaponized PDF file to attack utilities Industry network. Adwind, a.k.a Unrecom, Sockrat, JSocket, and jRat is a cross-platform RAT that distributed via malware-as-a-service in underground markets where users can purchase and utilize to target […]

The post Malware-as-a-service – Adwind Malware Attack Utilities Industry Via Weaponized PDF File appeared first on GBHackers On Security.

Read more

Forensics in the Cloud: What You Need to Know

Cloud computing has transformed the IT industry, as services can now be deployed in a fraction of the time that it used to take. Scalable computing solutions have spawned large cloud computing companies such as Amazon Web Services (AWS), Google Cloud and Microsoft Azure. With a click of a button, personnel can create or reset […]… Read More

The post Forensics in the Cloud: What You Need to Know appeared first on The State of Security.

Read more

Being a CISO Isn’t Just About Information Security – It’s About Building a Stronger Business Strategy

Gone are the days when being a CISO (or even just ‘the security guy’) was about actual information security or IT security. Even the term IT security is outdated now, as it emphasizes a one-dimensional view of what security is really about. However, I digress… The information security element of CISO is correct, but for […]… Read More

The post Being a CISO Isn’t Just About Information Security – It’s About Building a Stronger Business Strategy appeared first on The State of Security.

Read more

Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks

Many of us use Bluetooth technology for its convenience and sharing capabilities. Whether you’re using wireless headphones or quickly Airdropping photos to your friend, Bluetooth has a variety of benefits that users take advantage of every day. But like many other technologies, Bluetooth isn’t immune to cyberattacks. According to Ars Technica, researchers have recently discovered […]

The post Boost Your Bluetooth Security: 3 Tips to Prevent KNOB Attacks appeared first on McAfee Blogs.

Read more