Information Technology News & Information
rootkits-are-targeting-government-agencies

Rootkits are Targeting Government Agencies

Positive Technologies released an article on October 26, 2021 discussing the creation and development of rootkits in cyber attacks. Their research discovered that 77% of rootkits are used against government agencies. Rootkits, a dangerous type of cyber attack, are designed to intercept system calls, replace software and system processes, and may also contain keyloggers that […]

Information Technology News & Information

Twitter Hack

Earlier this week, a massive Twitter hack occurred, involving famous individuals and high-profile politicians. These hacked accounts asked for bitcoins and offered to “double the amount” to “give back to the community.” Twitter, while conducting its investigation, has commented on the situation, stating that the hackers had specifically targeted employees who had access to internal […]

Information Technology News & Information

A Dangerous New Keylogger is on the Market

“Mass Logger,” a new keylogger on the market, has the potential to become extremely dangerous for businesses and individuals. Keyloggers are a type of malware, usually found within phishing campaigns, that store all information you type into your computer. These malicious programs can lead to many of your passwords becoming compromised. Why is This Key […]

Information Technology News & Information

Cybersecurity News Bulletin

After the death of Iran’s General Qassem Solelmani, the United States may end up dealing with some serious cyber-attacks.  Since 1984, the United States has recognized Iran as a nation that supports terrorism and terrorist organizations, which has led to previous conflicts between the two nations. However, after the recent assassination of General Qassem Solelmani, […]

Information Technology News & Information

New Ransomware on the Rise!

New ransomware, Nemty, has been discovered according to the report from BleepingComputer. Nemty, as security researchers are calling it, has the possibility to spread using compromised Remote Desktop Protocol (RDP) connections. Nemty, like all other ransomware, holds the victim’s files hostage, deleting all shadow versions of the files while disabling the victim from any attempted […]

  • 1
  • 2