Ransomware played havoc in 2017, and later in 2019, we all thought that hackers have moved on to crypto jacking, which is a fast and reliable revenue source. Not done,…
Read MoreRansomware played havoc in 2017, and later in 2019, we all thought that hackers have moved on to crypto jacking, which is a fast and reliable revenue source. Not done,…
Read MoreA new browser-based attack has been devised, by some academics from Greece, which would allow attackers to run malicious code in browsers even after users leave a web page. MarioNet-…
Read MoreWe are set to end 2018, where we here at Hackercombat.com informed you for the whole year the cybersecurity news you need to know. And just like clockwork, the new…
Read MoreVirus infection, ransomware, phishing or cryptojacking malware are not the only techniques that cybercriminals used to earn money from their victims, a classic case of crimes works too. One such…
Read MoreThe growth of Bitcoin and its derivative cryptocurrencies have expanded people’s point-of-view on what it really is, a new representation of real-world money. We used to associate money to currency,…
Read MoreBanking Trojans are one of the most common malware these days, alongside ransomware and cryptojacking. And one of the most prolific of them all this year is named the Ramnit…
Read MoreRansomware has been a major headache over the recent years. Cybercriminals are currently re-looking at this malware family to concentrate on cryptomining and cryptojacking. Cryptocurrencies are still attracting criminals, regardless of the falling value, thus…
Read MoreCryptocurrency mining malware, also known as Cryptojacking has steadily stolen the spotlight from ransomware from last year. It is a form of malware with the goal of mining cryptocurrency for…
Read MoreMimecast, a data security firm recently announced the result of their quarterly Email Security Risk Assessment report revealing an 80% increase of phishing, through the use of impersonation activities. In…
Read MoreSecurity and privacy are the two foundations of Google’s persistence for promoting the use of their Play Store as the source for Android apps. Google checks apps published in the…
Read More