WHAT ARE THE SIGNS OF A HACKED WEBSITE?

The hacked website is a big problem becoming for business owners. Getting your site blacklisted, loss of traffic, complaints from client and hosting companies and all of the hard work you have put in into the promotion of your business is in danger. When the Giants Go DownEvery website is vulnerable to outage, even larger, well-known companies occasionally suffer website downtime. Every so often a client will contact us after the “death” of his website. Knowing the first symptoms of a...


A new generation of phishing tools was discovered In Darknet

Check Point experts in together with CyberInt specialists have discovered new-generation phishing-tools for fake website building that are actively advertised in darknet. According to experts, these tools represent a more advanced generation of threats to create more compelling fake sites. The author of phishing tools is hiding under the pseudonym [A] pache and encourages users with low technical backgrounds to create their own phishing campaign to gather critical information about users. To...


Google improves security tools in Google Cloud, G Suite

Google Cloud Platform and G Suite security will be increase On Wednesday, Google announced a set of new security features for the Google Cloud Platform and G Suite. According to the company, new opportunities will give companies more control over their security environment. For the Google Cloud Platform, VPC Service Controls' virtual private cloud management services were implemented. Currently, the alpha version provides a firewall for API-based services, as well as functions to protect data...


Hackers hide a miner malware installer on Github

Be careful the miner malware installer is on Github Analysts of Avast Software reported a new method of a hidden distribution of crypto-currency miners. They found a malicious installer, hidden in IT projects on Github. The detected malicious program is spread exclusively through phishing advertising. It is mostly hosted on adult websites or resources dedicated to computer games. In addition to the banners that are tied to the server with a redirector on Github, the researchers found a portal...


Google Play - found a new malware

Google Play - found a new malware Virus analysts found in the Google Play catalog 27 games with a built-in Android Trojan.RemoteCode.127.origin. It quietly downloads and launches additional modules that perform various malicious functions. For example, they simulate the actions of users, secretly opening websites and clicking on the elements located on them. Android.RemoteCode.127.origin is part of the software platform that developers use to extend the functionality of their applications. In...


Ends in 2017, and the password "123456" is still the most popular

Ends in 2017, and the password "123456" is still the most popular For many years, analysts at SplashData have published a list of the 100 worst passwords of the year Thus, experts hope to draw attention to the problem that such statistics will force users to think about security and realize that "password" and "123456" are completely insecure passwords. But, unfortunately, the overall picture varies little from year to year. The rating of the worst was traditionally drawn up on the basis of data...


Facebook introduced a new protocol for encrypting chat conversations

Facebook introduced a new protocol for encrypting chat conversations The Facebook company published on the portal GitHub the code for a new encryption protocol for group chat with increased reliability, which was named Asynchronous Ratcheting Tree (ART). According to the authors of the project - a group of researchers from Facebook and the University of Oxford - existing protocols do not provide enough reliable protection for correspondence in group chat messaging such instant messengers as...


Hundreds of sites use malicious WordPress plugins 3 years after they are discovered

Hundreds of sites use malicious WordPress plugins 3 years after they are discovered 14 malicious plug-ins have been removed from the official WordPress catalog by the end of 2014 Cyber security experts from the company White Fir Design reported that several hundred sites continue to use 14 malicious plug-ins WordPress after almost three years after they detected a malicious code. In late October 2016, experts warned the public about the presence of a backdoor in 14 plug-ins for WordPress, which...


Google will start filtering bad ads in Chrome

Google will start filtering bad ads in Chrome Chrome browser will have a built-in ads blocker. Google reported that, as of February 15, 2018, a special filter will remove ads that can cause users inconvenience. Formats that do not meet the standards set by the Coalition for Better Ads are considered unacceptable. This alliance was launched in September 2016 to maintain an attractive image of digital marketing. It includes Google, Facebook, Microsoft, Reuters, The Washington Post, GroupM, Procter...


Facebook fights extortion of likes

Facebook fights extortion of likes The administration of Facebook is taking new measures to protect data - the social network introduced a special algorithm for recognizing faces. It will help users in time to find out that their photos have been published, even if they were not noted on the images. Inhabitants of the social network began to complain that posts with appeals like "Put LIKE if Aries" are becoming more, but until recently it did not cause fear. In this regard, the team of Facebook...


Phishing sites are moving to HTTPS

Phishing sites are moving to HTTPS Phishing with false SSL certificates becomes massive - up to a quarter of fake sites are hosted on HTTPS-domains "Kaspersky Lab" recorded tens of millions of threats only in the third quarter. The green lock does not guarantee the authenticity of the resource - users must check the domain name. Crane Hassold, the head of the Phish Labs threat research department, described the scale of the problem as: "In the third quarter of 2017, we observed that almost a...


OWASP named the most serious risks for Web applications

OWASP named the most serious risks for Web applications Participants in the Open Web Application Security Project (OWASP) have compiled another list of the most dangerous threats for Web applications Participants in the Open Web Application Security Project (OWASP) have compiled another list of the most dangerous threats for Web applications. The new rating is formed on the basis of data from companies responsible for the security of web applications, as well as survey results of about 500...


A new unCAPTCHA system can bypass 450 reCAPTCHA in less than 6 seconds

A new unCAPTCHA system can bypass 450 reCAPTCHA in less than 6 seconds unCAPTCHA is a new automated system developed by experts from the University of Maryland at College Park, able to bypass reCAPTCHA from Googleinfo-icon with an accuracy of 85% This is due to the audio version of the hint for people with disabilities. unCAPTCHA loads the Capci sound file, then feeds it to six text-to-speech (TTS) systems. After that, unCAPTCHA sends the most likely response to Google's servers. Tests conducted...


Monero Miners use Google Tag Manager

Monero Miners use Google Tag Manager Attackers distribute the Coinhive Miner using Google Tag Manager Monero hunters, specializing in the introduction of the Coinhive Miner, have adopted the Google Tag Manager. As the security researcher Troy Mursch told The Register, he discovered Coinhive on the website of the South American television channel Globovisión. The code of the JavaScript-miner came from the built-in script of the Google Tag Manager Google gtm.js? Id = GTM-KCDXG2D, calling...


Google Advanced Protection: more protection at the expense of convenience

Google Advanced Protection: more protection at the expense of convenience A week ago, on October 17, Google introduced enhanced security features for the Gmail account, targeting primarily civil servants and journalists using the company's services. Experts do not consider the panacea a new set of tools for Advanced Protection, but thanks to it any user can get an impressive level of protection. Advanced Protection consists of three levels of protection, which may need journalists and those who...