Before you download, check that file! These are the file types hackers love most

If you follow reports from komando.com, you already know that cybercriminals frequently use malicious emails and text messages to infect victims’ devices with malware. The infection often comes from clicking on a Word document or PDF included in the email.

They sometimes use PNG files. Tap or click here to see how they do it. But a new report shows that malware is being delivered in clever new ways that make it more challenging to spot.

Keep reading to find out how criminals target your devices with malware and how to protect against it.

Here’s the backstory

Word documents, spreadsheets and text files are commonly used by hackers to inject malware into your devices. They send these malicious items through email or text messages. But a new Threat Intelligence report from HP Wolf Security suggests hackers have a new trick up their sleeves.

Criminals are increasingly using archivable file types such as ZIP or RAR files. These formats commonly compress larger, legitimate files into smaller single files. To access the content, the file must be extracted.

“Archives are attractive to threat actors because they are easily encrypted, making them difficult for web proxies, sandboxes and email scanners to detect malware,” HP explains in the report

It goes on to say that many companies use encrypted archives for legitimate reasons, making it challenging to reject encrypted archive email attachments. This puts the company at risk of data breaches and information fraud.

The use of ZIP and RAR increased by more than 10% over the last year. It now makes up 44% of all malware delivery systems. The use of executable files also increased by almost 10%, while PDF files stacked with malware dropped to only 2% of all instances. 

What you can do about it

Not all ZIP or RAR files are malicious. But you do need to be careful with any file sent to you through unsolicited text or email. No matter what type of file is included in a message, it could be an avenue of infection.

There are some ways to protect against malware infection. Follow these suggestions:

Continue reading

A PC virus is now attacking Macs - Here's what to look for

No matter who made it, any computer is vulnerable to attack from hackers or infection from a virus. No operating system is breach-proof, even if it is a Linux or macOS machine. 

It has been proven countless times that Apple’s Mac and iPhone devices also suffer from malware attacks. But some people still believe Windows computers and Android phones are targeted far more than others.

Continue reading

📩 Email espionage: Hackers are using compromised government emails to steal business info. Here’s how it works: You get an email about an emergency data request from the “federal government,” and the email address looks legit. It’s not. If you open the attachment or click a link, you’ve just landed a one-way ticket to malware. This kind of request will never come in the form of an email, folks.

Surprising way hackers can get their hands on your Windows password

Windows 10 is loaded with a plethora of features, but one of the things it’s known best for is its easy customization. With just a few clicks, you can easily swap out the desktop photo, change menu colors and even swap sounds. You can also save your settings as themes, which really puts the “personal” in personal computer.

Continue reading

Dangerous malware has a new trick: Stealing your email attachments

It seems as if most of us are faced with a never-ending deluge of spam these days. Whether it comes in the form of emails or robocalls, there’s no escaping that the huxters of the web are using this period of global lockdown to bombard people stuck in their homes with junk advertising and scams.

Continue reading