Cyber Alerts

Tier3 Cyber Alerts
Blog & News

Wifi WPA2 Security Cracked: ” KRACK ” attack puts nearly every Android and Apple device at risk

WPA2 –  is the encryption standard. It secures all modern wifi networks. Recent investigations show that it has been cracked. Any wifi hacker can now read all information passing over any wifi network secured by ...
Read More

Initial Coin Offering (ICO) Investment Guide : Risk Assessment Check List

What is  initial coin offering (ICO) ? An initial coin offering (ICO) is a fundraising investment method that trades future crypto coins for crypto currencies with immediate cash value. Usually, a percentage of the tokens ...
Read More

‘Locky’ Ransomware is Back Again : Ykcol and Asasin Ransomware Variants

Unfortunately, at this time it is still not possible to decrypt .asasin or .ykcol  files encrypted by the Locky Ransomware for free. Cybercriminals behind the Locky ransomware have revamped the malware’s code three times in ...
Read More

List of frequently blacklisted Mobile apps by Enterprises around world

Mobile security firm Appthority has published an interesting report that revealed some Android and iOS applications which are most frequently blacklisted by enterprises. Todays mobile ecosystem in an enterprise comprises of apps from managed devices, ...
Read More

Kaspersky – US government orders to removes (Russian) security software

The US Department of Homeland Security has told government departments and agencies to remove all security software from the Moscow-based company Kaspersky Lab from their IT systems.It said it was concerned about ties between company ...
Read More

Equifax Data Breach : 143 Million people affected in US, UK and EU

The hackers made off with the most crucial tools that identity thieves need to impersonate you. The worst-case scenario is a very real threat to millions of Americans. If the stolen information from Equifax gets ...
Read More

RESTORE_INFO-xxxx , 10 letter extra extension, 0x86, Plugins and new Ransomware

A new Variant of Ransomware has been reported by some of our clients. All data files (php, htm, txt, zip) are encrypted and have been renamed by adding a 10-letter file extension that looks random ...
Read More

India and Pakistan hit by Malware – “State-sponsored” cyber espionage campaign

The security firm Symantec has discovered another cyber espionage campaign against India and Pakistan which is likely to be state-sponsored.Security experts at Symantec have uncovered a sustained cyber spying campaign against Indian and Pakistani entities ...
Read More

Ransomware Targeting WordPress Sites in Pakistan

Recently, the Tier3 team has seen ransomware being used in attacks targeting WordPress sites in Pakistan. We are currently tracking a ransomware variant experts are calling “EV ransomware.” Ransomware is malicious software that an attacker ...
Read More

Pakistani government websites hacked on 70th Independence Day

In a major hacking attempt Indian hackers on 70th independence day of Pakistan have hacked several government websites and posted Indian flag and Indian anthem, officials in Pakistan Telecommunication authority officials said on Monday. The ...
Read More
October 17, 2017

Wifi WPA2 Security Cracked: ” KRACK ” attack puts nearly every Android and Apple device at risk

Recent investigations show that WPA2 encryption can been cracked... Get latest patches for your mobile phones and laptops from .... An attacker could now read all information passing over any wifi network ..., almost 90% of all modren wifi devices are affected.
October 14, 2017

What is ICO Money all About ? : Guide to ICO Token Sales

Token sales are, quite simply, a process of generating and selling a new crypto currency. Initial Coin Offerings ICO can be considered as an alternative form of crowdfunding that has emerged outside of the traditional financial system.
October 13, 2017

Initial Coin Offering (ICO) Investment Guide : Risk Assessment Check List

Must Read for a successful initial coin offering (ICO) investment. This ICO Investment Guide will discuss the main factors to consider when evaluating an ICO investment.
October 13, 2017

‘Locky’ Ransomware is Back Again : Ykcol and Asasin Ransomware Variants

Unfortunately, at this time it is still not possible to decrypt .asasin or .ykcol  files encrypted by the Locky Ransomware for free. Cybercriminals behind the Locky […]
October 6, 2017

List of frequently blacklisted Mobile apps by Enterprises around world

Mobile security firm Appthority has published an interesting report that revealed some Android and iOS applications which are most frequently blacklisted by enterprises. Todays mobile ecosystem […]
September 14, 2017

Kaspersky – US government orders to removes (Russian) security software

  The US Department of Homeland Security has told government departments and agencies to remove all security software from the Moscow-based company Kaspersky Lab from their […]
September 13, 2017

Equifax Data Breach : 143 Million people affected in US, UK and EU

The hackers made off with the most crucial tools that identity thieves need to impersonate you. The worst-case scenario is a very real threat to millions […]
September 4, 2017

RESTORE_INFO-xxxx , 10 letter extra extension, 0x86, Plugins and new Ransomware

A new Variant of Ransomware has been reported by some of our clients. All data files (php, htm, txt, zip) are encrypted and have been renamed […]