Posts

Showing posts from September, 2018

Free ethereum Spinner – A Honey Trap

Image
All work and No Play makes Jack a dull boy’. Since childhood we have been taught to maintain a balance between the work and recreation to revitalize the mind’s abilities. Online gaming is gaining immense popularity especially among young generation as it is a source of entertainment and refreshment after a hectic schedule. Earning money by playing games online at the same time would be the icing on the cake. Most of us may be acquainted with the fact that earning money by playing games online is now possible. However earning a quick buck without spending a penny is like dream come true.  With Free Ethereum Spinner and similar cryptocurrency game apps available on Google Play Store, you can mint money while enjoying playing. All you need is an android phone and access to Internet. Excited ? Don’t Be! Read more! Free Ethereum Spinner is an android application available on Google Play Store from February 2018. The app has been well received by the public with more than 100,0

Chrome Mirrors Your Login To Other Google Service

Image
The huge release of  Chrome 69  brought in many new features to the search giant. Google Chrome got  applauded  for the  slick new theme ,  Auto-fill improvements & Password Generator ,  Built-in Ad blocker ,  colorful backgrounds  &  custom shortcuts on new tab page & much more! Despite the new features ,  Google has been a  target of criticism  and  reproval  from its users for  omitting www  and  m sub-domains from the URL . The  counterblasts  compelled Google to  soften its stance  and consider public feedback, as stated in the Chromium bug tracker issue. Search Giant decided to  roll back the changes  made to Chrome 69; however, the reversal will persist till the release of Chrome 70. Security experts & users are still up in arms after noticing  another weird behavior  of  Chrome 69 . Any Idea? Another Weird Behavior of Chrome 69 :  Forced Logins Imagine getting log in to Google Chrome without your consent while you log in to your Google account or any Goo

“www” is back to Chrome 69!

Image
Google celebrated its tenth anniversary this month which marked the major release of Chrome 69 Version. The New Chrome browser got a facelift; however it left the users stunned by eliminating “www” and “m” protocols from the URL in the Address Bar. This announcement brought about a wave of criticism and anger to the search giant. Furthermore, the URL truncation created confusion among many users as it was harder to identify if the websites were legitimate and it could pave a way for more scams on the web. The idea of snipping Chrome www URLs raised questions on the Google’s intents and kindled fierce reproval from Chrome Users. The annoyed users found out way to return to classic Google Chrome interface by changing the flag settings. The counterblast from the users compelled Google to soften its stance. It considered the public opinion & feedback and rolled back this change in Chrome 69, as stated in the Chromium bug tracker issue. Google brought back subdomains “www”

Xiaomi now shows ads within the Phone UI

Image
XIAOMI shows Ads in Settings App Are you acquainted with the following marketing terms? Sell the Sizzle NOT the Steak, Sell the Benefits not the features Or perhaps you have heard it put like this “Sell people what they want, NOT what they need”- Needs define the overall market and wants define the market segments. Though there could be many ways to quote it, The gist remains the same “People Buy on Emotion and Justify their purchase Using Facts”. In a competitive market, the ability to promote the products or services to your customers goes a long way. You could be offering the best product or service in the world, but if you don’t promote it properly, you may end up losing money down the line. Advertising is deemed as an effective way of bringing your products or services into vogue. When the product is announced or shared on top websites or frequently used apps, probability of generating quality traffic increases. Businesses now days are adopting this marketing

Google Play vulnerable to Fake finance apps target users around the world

Image
Google Play Store is a premier global marketplace to distribute innovative apps and games. Its stringent developer policies make this online platform world’s most trusted source for apps and games.  Google Play Store’s Developer Policies include: * Prohibiting apps with Sexually Explicit or Inappropriate Content that promote hatred, violence, terrorism, bullying and harassment. * Discouraging apps that expose users to deceptive or harmful financial instruments. * Forbid apps that promote illegal activities like illicit sale of drugs, liquor, or tobacco etc * Taboo copied or impersonated apps that aim to deceive users. * Interdict apps that infringe on the intellectual property rights of others. The list of these policies is non-exhaustive. Google Play Store has earned a huge fan following because of these policies. Billions of Android and Windows users rely on Google Play Store to download any app or games. However we should also understand that with evolving technologies c

How to Remove Crypto-Extortionist Rektware Ransomware?

Image
GUIDE TO REMOVE REKTWARE RANSOMWARE Rektware Ransomware  is a crypto-virus that has been added to the family of  Ransomware  recently. The pursuit of  Rektware Ransomware  was first reported on 14 th September 2018 by  Serbian Security researcher GrujaRS . The relatively smaller Sample size of Rektware Ransomware as compared with other large scale ransom attacks signifies the  ongoing development & spread methodology . The identifiers signifying the surrender to this crypto-virus are: Inaccessible Files Random extensions  .CQScSFy and .2PWo3ja Numerically Renamed Files The origin & distribution location of this malicious newly discovered virus is still vague. However, it is known to be  developed by a team of remote hackers  with the sole  motive to mint illegal money  through innocent users. It has infected millions of systems across the world so far. It can  smartly plunder  all the versions of Windows Operating System. Following the invasion, it  encrypts all the

How to Remove Learnthelyrics Browser Hijacker

Image
Learnthelyrics is an illegitimate browser re-director that stealthily installs in user’s system via deceptive tactics. Apart form regular approach adopted by threat actors to sneak the ghastly infection in the system, the malicious extension is also distributed via its dubious web domain. learnthelyrics is dodgy website that lures users with lucrative offers like: 1. Instantly find songs by entering artists, title, album or even lyrics in the search box. 2. Find lyrics of any song quickly and easily. 3. Discover more information about your favorite song, artist or album. To gain user confidence, The pernicious re-director when downloaded via the malignant domain i.e. learnthelyrics in Chrome browser, it redirects users to official chrome web store – an infamous Google’s online store for web applications for Google Chrome browser or Google Apps. Read Full Article

Jaxx wallet phishing campaign: Cryptocurrency Miners Swindled of Blockchain Assets

Image
Jaxx wallet phishing campaign aimed to drain user wallets Cryptocurrency miners! Are you in a state of dilemma of where to store the cryptocurrency you own? Are you wondering if the Jaxx wallet is a correct place to store the cryptocurrency you have bought? The official Jaxx cryptocurrency wallet has enmeshed in a phishing campaign designed to drain user wallets. Before we go in depth of Jaxx wallet Phishing campaign, let us get enlightened with  Cryptocurrency Wallets. Cryprocurrency wallets are necessary for trading  Bitcoin , or any other digital currency. Before you consider trading in cryptocurrency, you first need to know what cryptocurrency is and how it works. A crypto currency wallet comprises of two elements-  a private key and a public address. Private Key:  In order to access your cryptocurrency wallet, a cryptocurrency holder should own a private key.  This key if fallen in wrong hands can lead to the embezzlement of your cryptocurrency wallet. Public Address : I

Yet Another example of Snapdeal Forgery!

Image
Snapdeal – a well known e commerce platform is in grip of cyber criminals! Famous E commerce platforms were already notorious for not meeting the end requirements of many a customer! The complaint of getting wrong or no items were already high with Snapdeal forgery! It has now proven as a tough cookie for the lower middle class population who dream big in terms of facilities! The recent example should be treated as an eye opener where an innocent man was deprived of his hard earned money when he ordered mobile earphones from Snapdeal. This latest case of Forgery happened with Sanjay Barman, 25 years, a local resident of Keerti Nagar, Jaipur Rajasthan, India. Sanjay placed the order of headphones on Snapdeal on 03rd September 2018! Sanjay received the first message from MD–SNAPDL about the successful shipment of the Headphones he ordered. The digital process was backed with automated messages from the company with the status information about the product he offered.

MikroTik Routers vulnerable to cryptocurrency mining campaigns

Image
Over 3,700 Unpatched MikroTik Routers Abused In CryptoJacking Campaigns The vulnerability  CVE-2018-14847  in  MikroTik RouterOS has become eye-candy for cyber maniacs. The ease of exploitation of this vulnerability has resulted in massive abuse of these routers and their network resources in cryptomining. The threat actors exploit the known vulnerability in MikroTik Routers by executing a malicious script to gain administrator privilege on the router. Mikrotik was founded in Latvia in 1995. The brand particularly focuses on designing wireless devices and routers. With the help of a congruent and hidden script, cyber hackers were able to misuse the network resources and bandwidth of MikroTik Router in mining CoinHive Cryptocurrency. CoinHive is a JavaScript cryptocurrency miner for the Monero Block-chain. CoinHive in-browser cryptocurrency mining script thst can be embedded in a browser easily. That is why this cryptocurrency mining script is popular among threat actors. This ca

How to Remove Mcplayz.com Pop-ups?

Image
Guide to remove Mcplayz.com Pop-ups Does your browsing activity get hampered due to sudden appearance of online toll-free videos and films Graphical User interface (GUI) window? Definitely your browser has fallen prey to  Mcplayz.com pop-ups caused by  nefarious ad generating malware intrusion in your system. If you are apprehensive of the possible damage caused by the unforeseen nuisance online advertising display in the foreground of your visual interface, you need to take a quick action against the nasty  adware  infection installed in your system.   What is   Mcplayz.com Pop-up? Mcplayz.com pop-up  is an online advertising window that offers internet users to watch stream videos. In order to lure users to click on these malevolent pop-ups this ad generated software offers them to watch films or videos for free. For instance the malware program displays ads that offer: An extensive array of Movies ranging from classic favorites to hilarious comedies and spine-tingling t

Adware Doctor: A Security App for Apple users with malicious intentions

Image
Ever wondered that the Guardian of your system software that is meant to protect your system against malware attacks can step into the breach? A recent security research demonstrated a popular anti-malware app called Adware Doctor that was supposed to protect Apple MAC users against privacy and security threat, ironically, siphoned off browsing history and information about system processes and applications. It turns out that Apple; the most convincing consumer electronics and computer software brand in terms of security is under interrogation for not acting quickly in removing the dubious app. What is Adware Doctor? Adware Doctor was one of the top paid apps (sold for $14.99) in the Mac app Store with 4.8 star rating and over 7,000 reviews. The app claimed to: 1. Remove suspicious and unwanted extensions 2. Clear Browser cookies and caches to restore your browser 3. Remove Adware, malware and other nasty system infections from Apple PCs. 4. Kill annoying pop-ups and 5. R

Chrome 69: A Boon or a Bane?

Image
WWW (World Wide Web) or the Web was invented by Tim Berners-Lee in 1989. This is an information space (network of online content) of interlinked HTML pages that can be accessed over the internet. Since 1989, the Web has continued to evolve and been a centre of development to the Information Age. It has become the primary tool that billions of people use today to interact. Google Chrome  celebrated its tenth anniversary previously this month & redesigned its browser & gave it a major facelift. However, with the extricate of the latest version of  Chrome 69 ,  Google  has decided to omit  www sub-domain  from the URL displaying in the  Browser Address Bar (URL Bar). Furthermore, the new  Chrome 69  also removed “m.” sub-domain that is used for web pages specifically designed for mobile browsers. The removal of sub-domains  initiated a wave of concern and outrage  among the users and security experts. But a  Chromium source code developer  later stated that  Google i

Tesla Backs Up Car Security Firmware

Image
Tesla is an American based automotive and Energy Storage company founded in 2003. This Multi National Corporation specialises in designing, manufacturing and selling electric cars, battery products and electric vehicle power train components. The sole motive of this premium electric-car brand is to accelerate world’s transition to sustainable energy and move towards zero- emission future. Tesla is renowned worldwide for its security-aware attitude. The infamous hardware and firmware manufacturer is known to focus on improving the security of their products and service offerings. Taking the security advantage to the next level, Tesla recently disclosed its safety and protection guidelines. As per the disclosed guidelines, Tesla Backs Up Car Security Firmware. The manufacturer of the infamous electric vehicles welcomes researchers to probe software in its cars for security bugs. Directives for Engagement  The participating researchers need to register themselves as well as seek

Google Play Store’s Security Guidelines Violated- Fake Yandex Voice Assistant App Found

Image
Google Play store is a digital distribution service platform that is the official app store for Android Operating Systems. Developed and launched by Google on March 11th 2015, Google Play store provides an amazing and safe download platform enabling users to browse and download applications. The services offered by Google play store have turned the cumbersome task of downloading apps in Android devices a child’s play. The availability of in-numerous useful categories of apps of user interest like music, magazines, e-books, television programs, games and movies on Google Play store has helped  extricating user’s downloading experience. Moreover, the stringent developer policies of this online application retailer has empowered and maintained user confidence since its introduction. Let us take a look at few of Google play’s policies and guidelines. The policy prohibits the display of apps that: 1. Contain offensive or harmful contents or materials 2. Behave in unexpected ways

The “Snoopy” Onavo Protect- Another Wave of Criticism to Facebook

Image
Lucas Stefanko, the famous malware hunter who has made a commendable contribution in finding malicious malware like  Trojan , has  yanked Facebook  for  harvesting user’s data  through Onavo  Protect  . It is a VPN Client that  professed to help the users  to  monitor their data usage  and  protect  their  personal information . In February 2018, Facebook was reported to  advertise Onavo VPN  app within  Facebook  app for iOS users in the United States. Thereafter,  Onavo  was declared as a  spyware  by the media outlets as the  app had no significant mention of Facebook’s ownership  that led to the denouncements of the app. Onavo started as an independent organization in 2010 and developed mobile apps like Onavo Protect etc.  They  announced their acquisition  by Facebook on 13 th  October 2013. The Onavo Protect App  aims to protect  the e-mail accounts against the phishing attacks, help users  to monitor their data usage  & to  secure their data  when they browse a

How to Remove SimpleHolidayRecipes Browser Redirector?

Image
Guide to Remove SimpleHolidayRecipes Browser Redirector Have your  browser settings changed without your assent  and you are finding it difficult to bring the old settings back? Are the browsing searches getting redirected to  https://hp.myway.com/  and  https://search.myway.com  and  ruining your web experience ? Are  pop-up alerts and links to unpleasant sites  becoming part of your daily web browsing? There are odds that  your browser may have yield to malign website –  SimpleHolidayRecipes Browser Redirect ! What is SimpleHolidayRecipes Redirect? SimpleHolidayRecipes Browser Redirect  is a  hoax search engine  that  manipulates  your default home page and browser settings without your consent. It  plunges and blocks  the possibility of finding the required information from the internet as the search results  bombards your system  with tons of maddening  pop-up adverts  and  links to malicious sites ! The  Mindspark Interactive Company  developed this browser hijacker.

How to Get Rid of MEM:Trojan.Win32.Adject.gen?

Image
Is your browser homepage or default search engine changed without your consent? Are the common operations like starting your system or shutting it down becoming sluggish? Take heed! Probably your system has given in to a malware- Trojan.Win32.Adject.gen ! Trojan.Win32.Adject.gen is a malicious software/code that masquerades being legitimate application, but is, in fact harmful. This Trojan has become common these days and is renowned for its detrimental threat. It silently sneaks in the system along with free applications & games and attachments of spam e-mails. Pop-up ads are also responsible for letting this Trojan creep in. This malicious software aims at regulating virulent codes and redirecting the web searches. Trojan is harmful & cannot replicate. It mints huge money for its developers by performing nasty functions on the infected systems. MEM: Trojan.Win32.Adject.gen has gained popularity among the hackers and cyber-thieves now-a-days. MEM: Trojan.Win32.Ad

Guide to Remove Unisearchweb.com Browser Hijacker

Image
Unisearchweb.com  is a fake search engine deemed as a browser hijacker redirect. The malicious domain falsely claims to enhance user browsing experience by providing: Quick access to your favorite websites Uncluttered Search results Private web Searches to keep your search history safe. The appearance of this website barely differs from the popular search engines like  Yahoo, Google, Bing  and other legitimate sites to deceive users. The template of this search engine includes: Main Search Box: Queries searched through it redirect to Yahoo search engine.  However, it is a sheer trick adopted by threat actors to gain user confidence. Hence, you are recommended not to fall in the trap as the search results are in-genuine and promote sponsored web pages. Search & I’m Feeling Lucky buttons:  Placement of these buttons in the search engine UI (User Interface) is a devious ploy embraced by cyber maniacs to deceive users in believing it as a legitimate search engine that res

How to Remove CryptoNar Ransomware?

Image
Are you unable to access your system files? Do you find .fully.CryptoNar or .partially.CryptoNar extensions appended to the file names? This indicates that you have fallen in trap of a malicious CryptoNar ransomware, a variant of CryptoJoker ransomware that is known to have raised havoc two years ago. Ransomware attack is now no longer front-page news and the devastation caused by it can be traced back to middle of 2000. The success of ransomware attacks overtime has encouraged cyber criminals to come up with new versions of this malicious crypto virus and extort users. Ransomware attacks are prominent among enterprises, SMBs (Small and Midsize Business) and individuals alike. With more than 7600 attacks, ransomware has emerged as new global threat when compared with a total of 6000 combined data breaches for the same time period. It has caused a loss of an alarming $1.6 million. CryptoNar Ransomware, a newly discovered crypto virus distinguishes from its counterparts.