[email protected] +603-2181 3666
Extol Threat Intelligent Notification
Poweliks Trojan
June 22, 2015

On the subject of malware, there is a new one in town. Well, not exactly new as it was first discovered in August 2014. What is new is that it is now being used in conjunction with ransomware to target consumers.   Poweliks is emerging as an adware (see Definition) click-fraud that is distributed via […]

IT News

A database supposedly from a sample of information stolen in the much publicized hack at the Office of Personnel Management (OPM) has been making the rounds in the cybercrime underground, with some ne’er-do-wells even offering to sell it as part of a larger package. But a review of the information made available as a teaser indicates […]

Unlike conventional World Wide Web technologies, the Tor Darknet onion routing technologies give users a real chance to remain anonymous. Many users have jumped at this chance – some did so to protect themselves or out of curiosity, while others developed a false sense of impunity, and saw an opportunity to do clandestine business anonymously: […]

Government and military organisations in Southeast Asia seem to be a target of cyber espionage campaign. It is most likely state-sponsored and has been named “Lotus Blossom” by Palo Alto Unit 42. This adversary group is very well organised and may have the support from a country that has interest in Southeast Asia. To date, […]

IT News

Normally, I don’t cover vulnerabilities about which the user can do little or nothing to prevent, but two newly detailed flaws affecting hundreds of millions of Android, iOS and Apple products probably deserve special exceptions. The first is a zero-day bug in iOS and OS X that allows the theft of both Keychain (Apple’s password management […]