• (919) 519-1227
  • info@ctgint.us
  • 1903 North Harrison Avenue, Suite 200 Cary, NC 27513. United States

Blogs

These are the worst passwords of 2021, so stop using them ASAP

Picking a strong password is more important than ever, but it’s also becoming increasingly difficult. Cybercriminals are constantly picking up new tricks, and it is nearly impossible to stay ahead of them. To make matters worse, some of us aren’t even trying. For the past several years, the team behind the password manager NordPass has been putting together lists of…

Read More

Hackers deploy Linux malware, web skimmer on e-commerce servers

Security researchers discovered that attackers are also deploying a Linux backdoor on compromised e-commerce servers after injecting a credit card skimmer into online shops’ websites. The PHP-coded web skimmer (a script designed to steal and exfiltrate customers’ payment and personal info) is added and camouflaged as a .JPG image file in the /app/design/frontend/ folder. The attackers use this script…

Read More

PRIVACY REPORT: WHAT ANDROID DOES IN THE BACKGROUND

We’ve come a long way from the Internet of the 90s and early 00s. Not just in terms of technology, capabilities, and culture, but in the attitude most of us take when accessing the ‘net. In those early days most users had a militant drive to keep any personal or identifying information to themselves beyond the occasional (and often…

Read More

Hackers are stealing 2FA codes with terrifyingly effective voice bots

Every time a massive data breach makes the news, we remind you about the best practices you need to employ to protect your online properties. You should never use weak passwords and recycle them. Instead, pick a password manager that lets you generate unique passwords for every different service, website, and app. And use two-factor authentication (2FA) or one-time passwords (OTP) whenever you…

Read More

Robinhood customers worried about the data hack: An identity theft protection service can help

On Nov. 8, investment platform Robinhood announced that a data hack revealed the personal information of more than 7 million of its customers.

Read More

These 23 fake Android apps are dangerous spyware, so delete them now

Danger lurks around every corner online. Whether you’re using a phone, a tablet, or a computer, you always have to keep your guard up to avoid hacks and scams. This is especially true for Android users, as dangerous phishing campaigns appear to be popping up on a weekly basis. The latest is PhoneSpy, and it involves a collection of spyware…

Read More

The breach of a major telecommunication company’s systems exposed communications between millions of people

Syniverse, a major telecommunications company, said hackers had been in its system for years.  The data breach exposed billions of text messages and millions of cell phone users’ data.  Syniverse itself said that almost all mobile carriers rely on its network.  Telecommunications giant Syniverse disclosed to the Securities and Exchange Commission last week that hackers had infiltrated its systems,…

Read More

Security researcher updates OMG Cables to record user keystrokes

Security researcher Mark Green, (who goes by MG) has revealed to the Vices team at Motherboard that he and his team have upgraded their version of a hacked Lightning cable in a way that allows a hacker to record keystrokes and then to send the data to a designated site. This would allow the device to be used to steal passwords…

Read More

Why You Should Stop Using Your Facebook Messenger App

If you’re one of Facebook Messenger’s 1.3 billion users, then you have just been given a serious reason to quit. While recent headlines suggest the platform is adding new security protections, there’s a nasty twist which makes this more risky than it seems, raising new questions about Facebook and its secretive backend systems. While Apple’s controversial CSAM update and surprise backtrack…

Read More

Wireless key-logger hidden inside USB-C to Lightning cable

A USB-C to Lightning cable with a hidden wireless key-logger can enable an attacker to capture everything you type from a distance of up to a mile. Any tech-literate person knows you should never plug a USB key into any of your devices unless you trust the person giving it to you, but fewer know that the same applies…

Read More