TrickBot malware now checks screen resolution to evade analysis

TrickBot malware now checks screen resolution to evade analysis

Posted by AngelaWong, 11-07-2020

The infamous TrickBot trojan has started to check the screen resolutions of victims to detect whether the malware is running in a virtual machine. When researchers analyze malware, they typically do ...

Australia

Australia's cyber security watch room is monitoring threats 24/7. Here's what it's like inside

Posted by AngelaWong, 10-07-2020

For a dedicated few, keeping Australia safe online starts in the early hours of the morning. That's when the day shift starts for analysts in the Australian Cyber Security Centre's 24/7 watch room. T...

Cerberus Banking Trojan Unleashed on Google Play

Cerberus Banking Trojan Unleashed on Google Play

Posted by AngelaWong, 08-07-2020

The Cerberus malware can steal banking credentials, bypass security measures and access text messages. A malicious Android app has been uncovered on the Google Play app marketplace that is dist...

The 10 Coolest New Cybersecurity Tools And Products Of 2020 (So Far)

The 10 Coolest New Cybersecurity Tools And Products Of 2020 (So Far)

Posted by AngelaWong, 08-07-2020

Securing The Future Vendors have spent the first half of 2020 advancing security everywhere from the cloud to the endpoint to mobile devices, debuting tools that quarantine and remove malic...

The Universal Clipboard privacy feature on iPhone’s latest iOS 14 exposed how LinkedIn was snooping on users.

The Universal Clipboard privacy feature on iPhone’s latest iOS 14 exposed how LinkedIn was snooping on users.

Posted by AngelaWong, 05-07-2020

If you think that LinkedIn has been playing it fair so far, you are gravely mistaken. According to a Twitter user, Don from Urspace.io, who goes by the handle @Doncubed, Microsoft&rsquo...

Windows 10 background image tool can be abused to download malware

Windows 10 background image tool can be abused to download malware

Posted by AngelaWong, 04-07-2020

A binary in Windows 10 responsible for setting an image for the desktop and lock screen can help attackers download malware on a compromised system without raising the alarm. Known as living-off-th...