Skip to content
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
  • Home
  • News
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Security
    • Books
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • Archive
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Fakes

Fake hot-babe spears businessmen on LinkedIn

2 August 2017

Throw all the social engineering awareness training at employees you got: they’re still mammals, and that means that fake profiles of hot chicks could drug them into pheromone-fueled …

Tags Data Loss, Fakes, Identity Theft, Malware, Phishing, SecureWorks, Social Networks

Iranian Espionage Campaign Hinges on Beautiful (But Fake) Woman

28 July 201727 July 2017

Iranian Espionage Campaign Hinges on Beautiful (But Fake) Woman An APT actor believed to be backed by the Iranian state is using an elaborate fake persona—a beautiful young …

Tags Campaigns, Espionage, Fakes

Iranian Hackers Used a Fake Persona Named ‘Mia Ash’ To Ensnare Victims

27 July 2017

a 30-year-old British woman with two art school degrees, a successful career as a photographer, and plenty of friends—more than 500 on Facebook, and just as many on …

Tags Cyber Threats, Fakes, Hacking, Web Development

Convincing NES Mini fakes are out in the wild

10 July 2017

During Nintendo’s NES Mini run, units were vastly short of the demand resulting in many disappointed fans across the globe. Of course, by now the microconsole is completely …

Tags Computer Hardware, Fakes, Tech News

Fake WannaCry Ransomware Uses NotPetya’s Distribution System

5 July 2017

Called FakeCry, the ransomware was delivered to M.E.Doc users on June 27, the same day as the NotPetya outbreak started. According to Kaspersky, it was run as ed.exe …

Tags Distribution, Fakes, Malware, Systems, WannaCry Ransomware

The Frightening Fake Kidnapping Call And How To Protect Yourself

5 July 2017

A few Sunday’s ago I received the most frightening phone call I have ever gotten as a parent. I answered to a young persons voice screaming for mom …

Tags Fakes, How-To

Mobile Menace Monday: Fake WannaCry Scanner

26 June 2017

With all the buzz around the PC ransomware WannaCry, it’s no surprise that a fake antivirus (FakeAV) has emerged on Google Play.  Entitled WannaCry Ransomware Protector for Android, the …

Tags Android, Antivirus, Cybercrime, Fakes, Google, Google Play, Mobile Development, Ransomware, Scanner

Necurs Botnet Distributing Locky Ransomware via Fake Invoices

22 June 2017

The Necurs spam botnet has switched back to distributing the Locky ransomware in a campaign featuring messages disguised as fake invoices, Cisco Talos security researchers reveal. Read full …

Tags Botnets, Cybercrime, Fakes, Locky, Malware, Ransomware

Hundreds of Fake Android Antivirus Apps Deliver Malware

15 June 2017

There are thousands of Android applications containing the label “antivirus,” but a big chunk of them are dangerous programs designed to infect devices of unsuspecting users with malware, …

Tags Android, Antivirus, Apps, Fakes, Google, Malware, Mobile, Mobile Development, Mobile Security

Fake news services and tools proliferate on online markets

15 June 2017

Fake news is not a new concept, but the Internet – and social media and networks in particular – have made it infinitely easier for it to spread …

Tags Fakes, Research, Social Media, Social Networking, Trend Micro

Scammers Are Using Fake Apple In-App Subscriptions to Make Lot of Money

13 June 2017

In this year’s annual event, Apple announced that the company had paid out $70 Billion to developers in the App Store’s lifetime and that $21 Billion of the …

Tags Fakes, Money, Scammers, Scams

Fake News-as-a-Service: Elections Can Be ‘Bought’ For $400K

13 June 2017

A 12-month campaign to manipulate an election can cost as little as $400,000 (£315,000) on the cyber-underground, according to a detailed new report on fake news from Trend …

Tags Elections, Fakes
Post navigation
Older posts
Newer posts
← Previous Page1 … Page26 Page27 Page28 Next →
Cookie-Free

NVD

CVE-2021-27314 – SQL injection in admin.php in doctor appointment system 1.0 allows an unauthenticated atta …

5 March 2021

CVE-2020-35328 – Courier Management System 1.0 – ‘First Name’ Stored XSS …

4 March 2021

CVE-2021-26028 – An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted …

4 March 2021

CVE-2020-25639 – A NULL pointer dereference flaw was found in the Linux kernel’s GPU Nou …

4 March 2021

CVE-2021-25344 – Missing permission check in knox_custom service prior to SMR Mar-2021 Release 1 allows att …

4 March 2021

CVE-2020-35329 – Courier Management System 1.0 1.0 is affected by SQL Injection via ‘MULTIPART street ‘. …

4 March 2021

EXPLOITS

Textpattern 4.8.3 – Remote code execution (Authenticated) (2)

4 March 2021

Web Based Quiz System 1.0 – ‘eid’ Union Based Sql Injection (Authenticated)

4 March 2021

Online Ordering System 1.0 – Blind SQL Injection (Unauthenticated)

4 March 2021

Textpattern CMS 4.9.0-dev – ‘Excerpt’ Persistent Cross-Site Scripting (XSS)

4 March 2021

Textpattern CMS 4.8.4 – ‘Comments’ Persistent Cross-Site Scripting (XSS)

4 March 2021

Online Ordering System 1.0 – Arbitrary File Upload to Remote Code Execution

4 March 2021

SECURELIST

Zero-day vulnerabilities in Microsoft Exchange Server

4 March 2021

Mobile malware evolution 2020

1 March 2021

The state of stalkerware in 2020

26 February 2021

Lazarus targets defense industry with ThreatNeedle

25 February 2021

DDoS attacks in Q4 2020

16 February 2021

Spam and phishing in 2020

15 February 2021

Information Cyber Network Enterprise Security News

© 2021 GeekWire | Privacy Policy | Cookie-Free | We are not responsible for the content of external sites.