The Security Blog From Gridinsoft

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed a critical vulnerability in Office that could allow attackers to…

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and gain access…

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and shutdown process and prevent them from ever happening. ZecOps has…

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage hack group Aquatic Panda uses the Log4Shell vulnerabilities, with the…

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party…

MyKingz uses Taylor Swift

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…

Password meter services risk

Password meter services put Internet users at risk

Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…

Message disable WhatsApp chat

An attacker in a WhatsApp group chat could disable messengers of other participants

Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

On July 18, 2018, the European Commission announced that it had fined Google €4.3 billion for violating EU competition rules. The fine was imposed after an investigation revealed that Google…

Smoke Loader Malware

Smoke Loader Malware: New Password-Stealing Infection Method

A new variant of the Smoke Loader malware has been discovered that uses a new method to infect computers. Smoke Loader is a sophisticated malware that has been around since…

Windows 8.1 ☠️ The End of Support

Windows 8.1 ☠️ The End of Support

First, it’s important to understand that Microsoft ended support for Windows 8.1 on January 9th, 2018. This means that the operating system will no longer receive security updates, bug fixes,…

What is Trojan.CoinMiner csrss.exe

What is Trojan CoinMiner csrss.exe?

Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…

Top 10 the most dangerous viruses of all time

Top 10 Deadliest Virus in

Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…

prevent data breaches

Once more about data breaches

One of the biggest breaches of databases happened recently – personal information on nearly 50 thousand users was stolen and replaced by random files with instructions on how to get…

Top-6 biggest tech failures of 2016

Top-6 biggest tech failures of 2016

Samsung Galaxy Note 7 The biggest failure of Samsung for all history is Galaxy Note 7. Smartphones started exploding, that caused a stoppage in production and users were forbidden from…