SafebytSafebyt
  • Home
  • Download
  • Pricing
  • About
    • Contact Us
  • Tutorials
    • Safebyt™ macOS
    • Safebyt™ Windows
  • Blog
  • Español
Press enter to begin your search
  • Home
  • Download
  • Pricing
  • About
    • Contact Us
  • Tutorials
    • Safebyt™ macOS
    • Safebyt™ Windows
  • Blog
  • Español
November 7, 2017
0

Multi-vector Attack Androind

By safebytweb | Uncategorized | No Comments

A multi-pronged attack on Android devices has been uncovered, which incorporates a bevy of threat vectors and social engineering tricks into a single scheme involving the Marcher Android banking Trojan.

Read More
November 7, 2017
0

DDoS Attacks Linux

By safebytweb | Uncategorized | No Comments

The share of Linux botnets is continuing to grow—accounting for 70% of attacks in Q3, compared to 51% in Q2.

Read More
July 22, 2017
0

Open Source Flaw ‘Devil’s Ivy’ Puts Millions of IoT Devices at Risk

By safebytweb | Uncategorized | No Comments

Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week.

Read More
April 14, 2017
0

Sysadmin accused of crashing former employer’s Oracle database with logic bomb

By safebytweb | Uncategorized | One Comment

A Massachusetts systems administrator is facing charges of breaking the Computer Fraud and Abuse Act, trespassing, and conversion – using other people’s property for a crime – after booby-trapping his former employer’s servers.

Read More
April 14, 2017
0

Flaws in Bosch Car Dongle Allow Hackers to Stop Engine

By safebytweb | Uncategorized | No Comments

Vulnerabilities found by researchers in Bosch’s Drivelog Connect product can be exploited by hackers to inject malicious messages into a vehicle’s CAN bus. The vendor has implemented some fixes and is working on adding more attack protections.

Read More
April 14, 2017
0

Why businesses should care about identity theft

By safebytweb | Uncategorized | No Comments

Identity theft is a type of fraud that’s directed squarely against individuals, but to believe that businesses don’t suffer any consequences or costs associated with it is simply wrong.

Read More
April 10, 2017
0

Twitch unleashes scorched-earth attack to unveil malicious spambot creator

By safebytweb | Uncategorized | No Comments

Amazon-owned video streaming site Twitch is taking a scorched-earth approach in a bid to ferret out who is behind a “malicious spambot.” The bots have been flooding streamers’ public chats with offensive, repetitive messages that have sometimes rendered their channels “unusable.”

Read More
April 10, 2017
0

IoT malware starts showing destructive behavior

By safebytweb | Uncategorized | 2 Comments

Hackers have started adding data-wiping routines to malware that’s designed to infect internet-of-things and other embedded devices. Two attacks observed recently displayed this behavior but likely for different purposes.

Read More
April 10, 2017
0

Booby-trapped Word documents in the wild exploit critical Microsoft 0day

By safebytweb | Uncategorized | No Comments

There’s a new zeroday attack in the wild that’s surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word.

Read More
April 2, 2017
0

IBM 4 billion online records were leaked in 2016

By safebytweb | Uncategorized | No Comments

IBM says that more than four billion records were leaked online in 2016, including a mix of credit card data, passwords and personal health information. The number of different bits about people’s private lives leaked online last year were up from 600 million exposed records in 2015, and one billion exposed records in 2014.

Read More
April 2, 2017
0

Bugged Microwave? More like hacked dishwashers

By safebytweb | Uncategorized | 8 Comments

A German researcher spotted a flaw in a networked dishwasher that could allow an attacker to access sensitive information on the appliance’s network.

Read More
April 2, 2017
0

House votes to repeal FCC privacy laws for ISPs

By safebytweb | Uncategorized | No Comments

Internet service providers (ISPs) soon will be able to sell their customers’ data — including their browsing histories — without their consent after the House voted Tuesday to rout the Federal Communications Commission’s broadband privacy rules.

Read More
March 27, 2017
0

Hackers threaten to wipe iPhones following iCloud breach

By safebytweb | Uncategorized | No Comments

Apple is reportedly in the grip of a very public extortion attempt, with the blackmailers promising to wipe 200 million iCloud accounts and reset the iPhones to factory default if they do not receive tens of thousands of dollars.

Read More
March 27, 2017
0

A Great Reason To Update Your iPhone: This Hack Breaks iOS Security With Just A Wi-Fi Connection

By safebytweb | Uncategorized | No Comments

The blurb for a presentation at the Black Hat Asia hacking conference this week would likely concern any iPhone owner: “The victim will only have to join the Wi-Fi network, and then the device will be compromised without any user interaction, bypassing all iOS mitigations and sandboxes.”

Read More
March 17, 2017
0

US Secret Service laptop stolen

By safebytweb | Uncategorized | No Comments

A US Secret Service laptop with Trump Tower floor plans and other sensitive material has apparently been stolen from an agent’s vehicle in New York.

Read More
March 16, 2017
0

Vulnerability in WhatsApp and Telegram allowed complete account takeover

By safebytweb | Uncategorized | No Comments

Check Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, attackers could completely take over user accounts, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more.

Read More
March 15, 2017
0

Canadian Agency Narrowly Avoids Breach from Zero-Day Flaw

By safebytweb | Uncategorized | No Comments

Canadian authorities managed to halt a cyberattack against its statistics agency that exploited a software flaw in Apache Struts 2, a web application development framework.

Read More
March 11, 2017
0

23 Incident Response Tips for Home Computer Use or Unwanted Social Media Attention

By safebytweb | Uncategorized | No Comments

One of the unpleasant realities of having a ubiquitous and very public online profile through social media is the risk of attracting an unwanted “follower” or “friend” who turns into an online-troll or stalker.

Read More
March 7, 2017
0

Twitch replaced its homepage with a Twitter clone for gamers

By safebytweb | Uncategorized | No Comments

Whenever I wonder what will eventually happen to Twitter, which is something I think about literally every day, I remember this Jessica Livingston tweet from September.

Read More
March 7, 2017
0

Can you see who views your Twitter? It’s complicated

By safebytweb | Uncategorized | No Comments

Knowing the specifics of who engages with your social media account and how they interact with it can be valuable information. When it comes to Twitter, the micro-blogging platform makes some information — like followers, likes, retweets — public.

Read More