The Facebook Pixel Hunt

Facebook Mozilla Firefox Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with a non-earnings newsroom Markup. The collective efforts of companies could be directed toward studies into a selected subject of the net that regularly stays disregarded through customers, researchers and policymakers. This time beneath the scrupulous eyes of experts and newshounds the predominant social platform Facebook… Continue reading The Facebook Pixel Hunt

Volvo Cars under Snatch attack

Snatch ransomware Volvo Cars Safe Mode

In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the company notified the relevant authorities and took steps to prevent further access to its property. Immediately shares of Volvo Cars fell 3.2% at 3:55 p.m.… Continue reading Volvo Cars under Snatch attack

Antivirus scanner and anti-malware. What is the difference?

Antivirus, anti-malware software, antivirus scanner… There are so many terms, and all of them look so similar, but they’re different. It is easy to confuse the user who does not have any information about all these things. Thus, it is important to clear out these things in easy words. From a certain point of view,… Continue reading Antivirus scanner and anti-malware. What is the difference?

Magnat campaigns delivering fake installers

Malvertising Redline Software

Cyber security specialists warn of the Magnat malicious distribution waves targeted at the potential users of some most popular software. Threat actors use the methods of malvertising to successfully distribute their malicious software installer. The work presents itself especially tricky as it predisposes its victims to a high degree of trust and feeling of legitimacy.… Continue reading Magnat campaigns delivering fake installers

Apache Log4j Vulnerability explained by Google

Google Java Apache Log4j Vulnerability

On December 17th, 2021 in their blog Google Open Source Insights Team explained the whole situation they observed concerning Apache Log4j Vulnerability. They described the widespread vulnerability and current progress in fixing the open source JVM ecosystem. Also Team shared their thoughts on how long it will possibly take for this vulnerability to be fixed… Continue reading Apache Log4j Vulnerability explained by Google

What is Discord virus? Investigating a new online fraud

Discord virus

Discord virus is only the name of a spamming campaign that takes place on this communication platform. The exact type of malware you can get through these tricks may vary in an extensive range. Nonetheless, the fraudsters’ method to fool you cannot be named original. There are two well-distinguishable ways – thick and gentle. A… Continue reading What is Discord virus? Investigating a new online fraud

Dogecoin scam: send credentials and pay $300

Dogecoin scam

Dogecoin scam is just a part of the online fraud which is spreading massively these days. It may have an impact on your wallet, as well as on your private information. Sometimes, the page where the Dogecoin scam takes place may be opened with the help of a virus. This post will uncover all details… Continue reading Dogecoin scam: send credentials and pay $300

Facebook virus: checking the details

Facebook virus

Facebook virus is a common (and partially misguiding) name for spam messages in Facebook. These notifications are spread from accounts of your “friends” on Facebook. Don’t misunderstand. They didn’t become spammers – the reasons for such behavior do not depend on them. However, first things first. Let’s figure out all aspects of this old-new online… Continue reading Facebook virus: checking the details

Google membership rewards scam: explaining the details.

Google membership rewards scam

Google membership rewards scam is a new popular type of online fraud. This page opens absolutely spontaneously, and says you got a valuable prize. With different techniques, fraudsters force you to share the personal information – name, phone number, email address, et cetera. And, as you can already guess, users get nothing, while cybercriminals get… Continue reading Google membership rewards scam: explaining the details.