News

Hackers used cookie theft to hijack YouTube Accounts

Attackers used cookie theft in order to hijack the channels of high-profile YouTube creators. It’s no secret that cryptocurrency scams are running rampant. Recently, hacker-for-hire networks have taken to posing as YouTubers and luring creators with bogus…
News

Learn how to block malicious websites on your computer

In this article, we’ll walk you through how to block malicious websites on your computer. You can do it with just a few simple steps. Keep on reading to learn how you can add an extra layer of protection for your computer. Moreover, it will help keep spam and phishing…
News

Hackers attack video game players through cheat codes

Cisco Talos discovered a new campaign targeting mainly video game players. Attackers use a new cryptor in different malware campaigns. In order to evade detection, they hid their cryptor in some files users download to install cheat codes or game modifications. The new…
News

Hackers use fake ad blocking software for ransomining

A fake ad blocking software lets attackers take over the power of computers in order to mine cryptocurrency. Analysts called this ransomining, which also encrypts data on the corrupted machines. Thus, attackers can then ask for a ransom. Ad blocking – a pretext…
News

Hackers published at least 300 Finnish patient records

The attackers had published the patient records, including names and contact information. Thus, according to the private Finnish psychotherapy center, the attackers used the anonymous Tor communication software. Patient records exposure determined an emergency meeting…