This complex malware is made to steal Remote Desktop Protocol (RDP) credentials, which is very dangerous for individuals and businesses.
Author: bk
FCC Reveals ‘Royal Tiger’ Robocall Campaign
An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.
Hackers Can Abuse Apple’s Wi-Fi Positioning System
A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.
Google guru roasts useless phishing tests, calls for fire drill-style overhaul • The Register
The main argument against current phishing tests is “there is no evidence that the tests result in fewer incidences of successful phishing campaigns,” said Linton.
Crooks plant backdoor in software used by courtrooms around the world | Ars Technica
A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack
Atari acquires longtime rival Intellivision – The Verge
Atari has announced it has acquired its former competitor from the ’70s and ’80s, ending what it says was the first-ever console war.