Article on the subject of "malicious attacks"
-
6 ways to prevent Drive-by Download
in the first quarter of 2011, business users faced an average of 274 web-based malicious attacks, an increase of 103% compared to 2010.
-
Half of the mobile phone was attacked by malicious code
many users have believed that mobile phones are safer than computers, but in fact more than half of mobile devices have been knocked out by malicious code in the past.
-
Malicious ad campaigns abuse Chrome to steal 500 million iOS user sessions
in recent times, many large malvertising attacks targeted ios users from the united states and many european union countries have been deployed.
-
Excel continues to be used as a lure for online fraud with complex mechanisms
the popular tools and software used by microsoft have become the target of hackers to deploy online attacks many times.
-
6 ways to prevent Drive-by Download
in the first quarter of 2011, business users faced an average of 274 web-based malicious attacks, an increase of 103% compared to 2010.
-
Strange ransomware detection only attacks the rich
other ransomware often spread to all victims if possible, but the new ransomware is different, it selectively infects.
-
Add 2 malicious samples to attack the Mac
security firm sophos has announced that it has detected two more malicious attacks on apple's macintosh computers.
-
Steps to protect email against malicious threats
the following ways seem to be very simple and popular, to the extent that 'everyone knows and of course', but not everyone seriously takes it to stay away from any risk of fraud or malicious code attacks.
-
Warning: Detected malicious code hidden in the graphics card's VRAM
one of the aspects that make cybercriminals dangerous lies in the initiative they take in deploying new forms of malicious attacks.
-
'Hero WannaCry' pleaded guilty to writing malicious attacks on the banking network, facing a 10-year prison term
marcus hutchins, a prominent security researcher with an important role to help prevent wannacry malware attacks in 2017, affected more than 75,000 computers of 150 countries.
-
Threats and risks from malware on USB Flash
in addition to the undisputed benefits, usb flash drives sometimes contain risks that cannot be underestimated if not used properly.
-
Summary of popular network attacks today
for attacks by exploiting vulnerabilities, hackers must be aware of security issues on the operating system or software and take advantage of this knowledge to exploit vulnerabilities.
-
The alarming increase in the number of attacks targeted at IoT devices
along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
-
Defeat China's largest hacker training furnace
chinese police have closed the website to recruit thousands of members and provide training on cyber attacks and malicious code.
-
Beware of deceptive and spreading malicious code via notification links of Google Alert
google alerts is a useful and widely used service around the world.
-
Warning: New malware can hijack Vietnamese users' access to Facebook and Gmail
a new line of malicious code using plugx rat is attacking vietnamese users.
-
The 4 most popular network attacks towards older people in 2018
a statistic has shown that in recent years, cyber attacks tend to focus more on older users.
-
Warning: VPNFilter malicious code attacks the router that has 'evolved', there are many extremely dangerous new features
newly discovered experts, vpnfilter has attacked and infected more than 500,000 routers recently added the ability to remove https encryption, attack intermediaries, and even wipe information on the device itself. .
-
More than 1.7 billion cyber attacks in 2013
mobile is a fast growing it sector. in 2013, security issues around mobile devices have reached a new level of increase in both quantity and quality. if 2011 was the year the mobile malware started to attract attraction to hackers, then in 2013, these malicious software became more complete and
-
Half of the mobile phone was attacked by malicious code
many users have believed that mobile phones are safer than computers, but in fact more than half of mobile devices have been knocked out by malicious code in the past.
-
Fileless malware - Achilles heel of traditional antivirus software
by the definition of being unified and widely recognized by many industry-leading security experts, the malware fileless is the type of malicious code that does not write malicious executable files to the file system.
-
Malware Judy attacked more than 36.5 million Android phones
malicious code judy now attacks 36.5 million android users through dozens of malicious applications and games with the judy brand.