News – General

New Android malware lets criminals control your phone and drain your bank account

The article warns about a new strain of Android malware that gives criminals full control of an infected phone and direct access to a victim’s bank accounts. It spreads through fake apps and phishing messages that trick users into granting permissions, after which the malware can read texts, capture screen activity, steal login codes, ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Cloudflare says it’s investigating the outage that brought down Zoom and LinkedIn

Cloudflare reported that a brief but widespread outage interrupted access to major services like Zoom and LinkedIn after a faulty configuration change disrupted its firewall and related systems. The issue was quickly identified and resolved, with the company confirming it was not the result of a cyberattack. Even though the downtime lasted only minutes, ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Update Chrome now: Google fixes 13 security issues affecting billions

The article reports that Google has released fixes for 13 security flaws that affect billions of users across Android, Chrome, and other widely used services. Several of the vulnerabilities were serious enough to allow attackers to gain elevated permissions, compromise data, or execute harmful code if a user opened a malicious file or link. ....

By |March 30, 2026|Categories: Data Safety & Cyber Security, News - General|

Fighting fraud at scale with Mastercard Threat intelligence

he Axios sponsored article explains how Mastercard uses large-scale threat intelligence to fight fraud across the global payments ecosystem. By analyzing vast volumes of real-time transaction data and signals from banks, merchants, and networks, Mastercard can detect suspicious behavior patterns and stop fraud before it spreads. The approach relies on advanced analytics and AI ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

How attackers use real IT tools to take over your computer

The article explains how attackers increasingly use legitimate IT tools to take over computers, making their intrusions harder to detect because the activity looks like normal system administration. Criminals often begin by stealing credentials through phishing or exploiting weak passwords, then use trusted remote management software to move through a network, install backdoors, and ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Scammers harvesting Facebook photos to stage fake kidnappings, warns FBI

The FBI has issued a warning that criminals are harvesting publicly available photos from social media like Facebook, LinkedIn, and X and then manipulating them to create fake “proof of life” images for virtual kidnapping scams, where they contact victims’ friends or family to demand ransom for a loved one who is actually safe. ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

DroidLock malware locks you out of your Android device and demands ransom

Malwarebytes reports that a new Android malware called DroidLock has been discovered actively targeting users, particularly Spanish-speaking ones, by tricking them into installing a malicious app from phishing sites that impersonate legitimate services; once installed with Device Administrator and Accessibility permissions, DroidLock takes full control of the device, uses overlays to capture unlock patterns, ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Wiz Co-Founder, CTO: Cybersecurity ‘Nearly Impossible’ Unless Everyone Owns It

Cybersecurity has become so complex and fast moving that it is nearly impossible to manage unless responsibility is shared across an entire organization, according to Wiz cofounder and CTO Ami Luttwak. He argues that modern cloud environments change constantly, making traditional security models that rely on a small central team ineffective at catching risks ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer

Cybercriminals are using Google Ads and high search rankings to push Mac users towards malicious AI chatbot conversations hosted on legitimate platforms like ChatGPT and Grok that appear to offer help with common macOS issues but actually contain instructions that lead to the installation of the Atomic macOS Stealer (AMOS). In these attacks, victims ....

By |March 30, 2026|Categories: Data Safety & Cyber Security, News - General|

The ghosts of WhatsApp: How GhostPairing hijacks accounts

The article explains a new WhatsApp account takeover technique called ghost pairing, which allows attackers to hijack accounts without alerting the victim. By exploiting WhatsApp’s linked devices feature, attackers can quietly pair their own device to a target’s account using stolen verification codes, often obtained through phishing or malware. Once linked, they can read ....

By |March 30, 2026|Categories: News - General, Data Safety & Cyber Security|

Recent news

Go to Top