Category: All

Update Logic Mishandle in Zemana AntiMalware 2.0: Fixed

Yes, it is true we that there was a critical vulnerability discovered in ZAM 2.0 update integrity check. Some of you probably read about it in one of the threads on Malware Tips or other websites. However, keep in mind that this vulnerability is not and never was present in our Zemana AntiMalware 3.0 Beta version. ...

It’s a Scam!

Ring, ring… ‘’Hello, who is this?’’ ‘’Hi, my name is Jack and I am calling from the company Onis, a software company that provides antivirus solutions.’’ ‘’Yes, and how can I help you? ‘’Well, our data shows that you PC has been infected with a very dangerous malware that can make serious damage to your ...

Release notes: In 2019 let’s clean that malware, shall we?

Maybe last year we have been quiet but this year we will be loud. So, we yell: REMOVE that malware MAKE that PC clean WE want a fast scan WE don’t want malware! You know how they say, send out positive energy to the universe and the universe will give you back more. Well, we ...

ZAM 3.0 Release Notes: You Can Now Scan Your PC in Safe Mode Too!

With the help from all of you, our hard work on ZAM 3.0 continues. Thanks to your comments, we realized that many of you were sad that the Safe Mode scanning feature was not available in ZAM 2.0. So, you will be happy to learn that we changed this. From now on, with ZAM 3.0, ...

ZAM 3.0 Release Notes: The New Version Is All About You

The progress on the beta version of our ZAM 3.0 is going great! All thanks to you, guys. However, there is still hard work to be done. New ZAM 3.0 is all about you! In other words, we put our product road-map in your hands. You will lay foundations and then it is up to us ...

Here is What Businesses Need to Know: Security Trends for 2019

2018 was a year that brought major breaches pretty much every week. So, in May, GDPR came into force as necessary means in protecting companies and their clients. Cyber security is still an important issue that troubles business world. As it seems, businesses will need to invest more resources and energy, if they wish to ...

Designed by Vectorpouch, can be found on https://www.freepik.com/free-vector/cyber-security-technology-illustration-of-private-network-secure-access-and-internet-firewall_2890889.htm

Untold Truth Of 2018 and What to Expect From 2019

There are a few days left for another year to end. During this year, many exploits were found and many governments, small and large companies suffered from cyber-attacks. Let’s remember some of the incidents that caused trouble… As the value of bitcoin increased to 20,000 USD during the first month of 2018, cyber-attacks slightly changed ...

2018 Cyber Security Overview

Christmas time is behind us and we are heading towards New Year, so we decided to take a moment, look back at 2018 and remember the major security trends:   From .exe Files to Package and Deploy Malware One of the most significant trends we saw early 2018 is the ongoing shift away from using ...

Progression from Stealth to Damage and Disruption

A decade or two ago, hackers were infiltrating the targeted network silently; they were waiting for the perfect moment to act and exit with no evidence left behind them. Thus, their attacks were unnoticeable and even the target companies hardly noticed that they were the victims of a cyber espionage or cyber-attacks. Hackers were lurking ...

The Scariest Month of the Year

Snow, Christmas movies on TV, Christmas trees, tea and big sweaters… These are all things that probably come to our mind when we say December. The festive season is approaching, and we feel certain coziness and warmth inside us. ‘’A month of lights, snow, and feasts. A time to make amends and tie up loose ...

Facebook Account Mysteriously Hacked: The Police Was Not Able To Help

As we all know, social media can take all our free time and even create addiction.  This was the case with one Australian software support specialist, who recently decided to deactivate her Facebook account precisely to fight her social media addiction. However, several months later, the account mysteriously appeared. Different Password According to 9news.com, an ...

Designed by Freepik, can be found on https://www.freepik.com/free-vector/flat-artificial-intelligence-background_1530315.htm

Future Threats Of The Cyber World

Age of Artificial Intelligence is upon us. Artificial Intelligence is started being used and it will be used in broader areas. If you did not notice before, YouTube tracks what you watch and recommends you other videos that you might like. If you like the video that was recommended, you choose to watch and let ...

Designed by Freepik and FreeVector.com, can be found on https://www.freepik.com/free-vector/anonymous-hacker-concept-with-flat-design_2785048.htm and https://www.freevector.com/swiss-army-knife

A New Threat That Will Leave Windows Users Helpless Soon

A new multipurpose attack tool, L0rdix, is currently on sale in Deep Web Forums that are hosted by hackers. L0rdix is written in .NET and designed to infect computers with Windows operating system. It aims to steal and mine while being in stealth mode. Despite being a one-attack-tool, L0rdix is capable of many actions. It ...

This is What You Should Avoid This Shopping Season

Holiday shopping season is finally here and many of us can’t wait to surprise our loved ones with new things. Some of us are looking forward to spoiling ourselves too. 😊 Black Friday, Thanksgiving, Christmas shopping – these are all around the corner. New data shows that 91 percent of the people shopping this weekend ...

Photo by zephyr_p/Fotolia

WannaCry: Still Threatening To Make You Cry

One and a half year later, WannaCry ransomware is still considered as one of the most serious threats in cyber world as well as the most widespread in the ransomware family. According to statistics, it has attacked 74,621 users worldwide. Biggest Ransomware Epidemic in History In May 2017, WannaCry caused one of the biggest ransomware ...

Modern Day Assassination Tool: Spyware

What is Spyware? As the name itself suggests, spyware is a malicious software used to spy on someone’s privacy. It can be used to capture data through screenshots or webcam captures. Another common way is through a technique called keylogging. This technique allows the malicious software to record every keystroke made by the user, which ...

Designed by Vectorpocket, can be found on https://www.freepik.com/free-vector/cartoon-illustration-of-bank-robbery-in-safety-vault_3090596.htm

Modern Day Heists: Bank Hackings

On November 6th, Federal Investigation Agency (FIA) Cybercrimes Director Capt. Mohammad Shoaib reported that almost all the banks in Pakistan were hacked and suffered a major security breach. The data breach was revealed when 10 banks blocked all international transactions on debit and credit cards. FIA did high level investigation when 100 cases of security ...

A Leading Media Company, Media Prima Attacked by Ransomware

Ransomware Hits Again It seems the situation is not getting any better because there are more and more major companies and networks reporting to have been victims of ransomware attacks. The most recent one is Malaysia’s leading media company, Media Prima, a company that runs TV, radio channels, newspapers and digital media. In the past ...

How to Survive in Today’s Cyber World

According to Routine Activities Theory, which is one of the four major victimology theories, the crime occurs when a motivated offender and a suitable target are present while capable guardians are absent. These three elements must converge at the same time and in the same environment. This theory suggests that a motivated offender will act ...