News  General
News  General


Over 8,000 different samples of a trojan being dubbed "DualToy" have been discovered in the wild after being initially identified in Jan 2015.

The unusual aspect to this malware is the mechanism it uses to hit it targets, which can be iOS or Android based.

The way it works is to first infect the Windows PC these devices are connected to via USB, then use the file transfer capabilities to deliver malware to the target, and it is capable of doing this to both Apple and Android devices. However, the good news is it is useless against those who keep everything up to date since it relies on weaknesses which were spotted and fixed several years ago. 

News  General
7 ways to stay safe with free WiFi

Digital hygiene

Free public WiFi can be a lifesaver. Your device can be out of the range of a mobile signal more often than you think, for example in underground stations or large buildings. Most tablet users don't even have a choice. Often you'll be alerted to a full-strength WiFi hotspot just itching for you to use it which claims to be "free".

Like anything in life, however, there is no such thing as a free lunch. "Free" anything usually wants something back in return and WiFi is no different. However, there is the risk of extra danger - not all hotspots are created equally.

Some of the dangers are not immediately obvious. Here we show 7 ways you can minimize the risks when using these free WiFi hotspots.

News  General

Uses the smartphones microphone

An ingenious hack has surfaced in a paper which shows a way to steal data from a PC/laptop using listening software on a smartphone, and malware controlling the cooling fans on the target system.

This convoluted setup wouldn't be of much interest if it wasn't for one particular trick it can pull off which almost none of the other malware attacks can - it targets air-gapped systems. Air-gapped is the term given to PC/laptops which are not connected to a network at all. Without a network connection, users assume remote hacks can't happen for obvious reasons.

Air-gapped systems are usually set up that way for good reason - they might hold classified military information, process sensitive financial transactions or operate industrial/medical critical infrastructure systems.

News  General
WhatsApp Gold

It's a scam!

Popular cross-platform messaging app WhatsApp has been embroiled in a novel attack which cybercriminals are using to steal users data. A version is in the wild which claims to offer exclusive features, such as the ability to send hundreds of messages at once and is supposed to be "used by celebrities". It apparently offers other features that are not present on the standard version and is going by the name "WhatsApp Gold".

If you receive a message offering to install this app - don't! Experts are warning users to spread the message that this app is NOT from the legitimate WhatsApp developers and will infect their handsets.

The scam has actually been around a while, and smartphone virus watchers have alerted users that an earlier version called "WhatsApp Plus" tried the same thing. This time, however, the message seems to be getting pushed far wider, hence the need to inform users as soon as possible to be on their guard.