Loraine Balita-Centeno

Journalist | Editor | Digital Media Specialist  

Everything You Need to Know About NetWalker Ransomware

Netwalker is a strain of ransomware that targets Windows-based systems. First discovered in August 2019, it evolved throughout the rest of 2019 and into 2020. Significant spikes in NetWalker targeted attacks were noted by the FBI during the height of the Covid-19 pandemic. Here's what you need to know about the ransomware that has attacked major schools, healthcare systems, and government institutions throughout the US and Europe.

What You Need To Know About Golang-Based Malware

Golang is becoming the programming language of choice for many malware developers. According to cybersecurity firm Intezer, there’s been an almost 2000 percent increase in the number of Go-based malware strains found in the wild since 2017. The number of attacks using this type of malware is expected to increase in the next couple of years. What’s most alarming is that we’re seeing many threat actors who are targeting multiple operating systems with strains from a single Go codebase.

Were You Affected By the DoorDash Data Breach?

The demand for food delivery services like DoorDash has skyrocketed in the wake of the Coronavirus pandemic. Since we give these apps a treasure trove of personal and banking information, you need to ask yourself, is my information safe? A massive DoorDash data breach by a third party was discovered in May 2019. A slew of personal information and financial details were compromised during the leak putting many at risk of a cyberattack. So how do you find out if you were affected by the DoorDash

What Is a Remote Access Trojan?

RATS or Remote Access Trojans have gone a long way from the prank tool 90s kids used to spook their friends. From simply opening CD trays and controlling computers remotely to scare their victims, it has evolved into some of the most prevalent malware in the wild. Here’s everything you need to know about this Trojan and what you can do about a RAT infestation. A RAT is a Trojan, a type of malware disguised as something else that victims need—like a legitimate file, program, or app. It tricks

What You Need To Know About Swatting

Imagine opening your door to see a swarm of heavily armed SWAT officers pointing their guns at you. You don’t know what’s happening. You have no idea why they’re raiding your home and kicking doors open. If this happens to you, you’ve become a victim of swatting. This means that someone placed a hoax 911 call to send authorities to your house. Many celebrities have become victims to this insidious “prank” and while it might seem like a joke for some, it can become extremely dangerous, even dead

Why That Email About Your Apple ID Being Locked Is a Scam

Since macOS and iOS are still more secure and impenetrable compared to other systems, cybercriminals resort to phishing tactics to hack into Apple accounts. They use social engineering to trick users into giving their Apple ID and password. So yes, that "Apple ID locked" email is fake. Here’s what you need to know about Apple scams and how you can spot one. Scammers who are out to steal your Apple information will use social engineering through phone calls, SMS, or even calendar invitations. B
Load More Articles