Monthly Archives: June 2014

Malicious Facebook scam claims Tracy Morgan’s Death

Social media including Facebook are often used by scammers to promote their fake applications or malware. the problem with those type of attack that the malicious link will be shared with victim friends and allows to further circulation. over this

Cybercriminals create a network sniffing malware to reach bank customers

Online banking have made all systems connected and allowed users to easily purchase their product without any issue. while this is an advantage there are still some disadvantages for such solution with human vulnerabilities. In the last few years cyber

drozer- security and attack framework for Android

Android becomes a popular platform for developers and we see an increasing number of applications running on mobile devices that support this system. Technology have rapidly changed and security tools for making the assessment are also increasing.  drozer is a

Compromised banner on Nico Nico Spreading Fake Flash Player

Popup and advertising banner is one of the way that cyber criminals use to promote their malwares. some of the similar incident were found in the past include popular website such as yahoo, New york Time where attacker managed to

‘Your files have been damaged’ Fake Email Lead to Canadian Pharmacy Stores

Several spoofed emails were spotted by Malwarebytes security researchers that are targeting cloud based system users. the first is a spam that notify victim that their image have been successfully uploaded to Box cloud servers but they are damaged. this

How Safe is the Incognito Mode in Google Chrome

Google Chrome can be called one of the most popular browsers used by people all across the world. The main reason for using Chrome is the ‘Incognito’ mode that allows private browsing to the users. Through this mode, the users

SpiderFoot Remote Footprinting and Reconnaissance Tool

Footprinting your target is one of the first steps you run during a penetration testing. This will help to identify system configuration and applications used. One of the tools that you can use is spiderfoot. spiderfoot is a python based open