activity

AppWizard
December 4, 2025
Opera has updated its Android application to allow users to switch between various search engines and AI models directly from the browser's address bar. The new Ask AI button enables users to attach files, including photos and PDFs, for tasks like translation or summarization, and allows users to attach entire tabs for follow-up questions about webpage content. This update reduces the need to switch between multiple AI chatbot applications, enhancing the browsing experience. Opera has implemented privacy measures to restrict the AI's access to only the context of the shared tab, ensuring it does not access browsing history or other activities. The update is being rolled out on the Play Store.
Tech Optimizer
December 3, 2025
The Wacatac Trojan is a type of malware first documented in January 2020, known for disguising itself as benign software to trick users into installation. It operates under various aliases, including Trojan:Script/Wacatac and Trojan:Win32/Wacatac, and can connect to Command-and-Control (C2) servers for remote manipulation. Its capabilities include stealing credentials, evading antivirus detection, creating or joining botnets, causing system damage, enabling spyware functions, acting as Remote Access Tools (RATs), and downloading additional malware. Symptoms of infection include sluggish performance, program failures, unexplained storage reductions, and unfamiliar processes. Wacatac spreads through unofficial software, malicious web pages, and phishing emails. Removal is best achieved using reputable antivirus software, while prevention involves avoiding questionable downloads, practicing good digital hygiene, keeping software updated, backing up data, and using quality antivirus solutions. False positives can occur, where legitimate programs are mistakenly flagged as Wacatac.
Tech Optimizer
December 3, 2025
Fileless malware operates within a computer's active memory, avoiding detection by traditional antivirus solutions that rely on file scanning. It uses legitimate tools like PowerShell to execute harmful commands without creating files, making it difficult to identify. Cybercriminals can use fileless malware for various malicious activities, including data theft and cryptocurrency mining. Malwarebytes combats fileless attacks through two defense layers: Script Monitoring, which intercepts potentially dangerous scripts at execution, and Command-Line Protection, which scrutinizes command-line tools for suspicious activities. Examples of fileless attacks include malicious email attachments activating PowerShell to download ransomware, hidden JavaScript on websites mining cryptocurrency, and attackers using Windows Management Instrumentation (WMI) to create backdoors. Malwarebytes' Fileless Protection operates automatically in the background, ensuring legitimate applications function normally while monitoring for threats. It is part of a comprehensive security framework that includes machine-learning detection and web protection, designed to stop attacks that do not write files. This protection is included with Malwarebytes Premium, aimed at safeguarding personal and small business systems.
Tech Optimizer
December 2, 2025
Malware remains a significant threat, with DanaBot targeting Windows devices and a new strain of Android malware capable of stealing debit card information. Nearly three-quarters of Americans have experienced online attacks, highlighting the importance of antivirus software for digital security. Antivirus software can protect against various threats, including malware, ransomware, Trojans, spyware, and adware, but it cannot prevent social engineering attacks, physical theft, zero-day exploits, or vulnerabilities from outdated software. Regular updates and additional security measures are necessary for comprehensive protection.
Tech Optimizer
December 2, 2025
Artificial Intelligence (AI) is transforming the cybersecurity landscape by enabling sophisticated cyberattacks, such as ransomware and deepfakes. Ransomware has evolved from manual coding to AI-driven automation, making attacks more efficient and harder to stop. AI automates the targeting of victims by analyzing large datasets to identify vulnerabilities. Machine learning allows malware to change its form to evade detection, and ransomware can operate autonomously within networks. Phishing attacks have become more convincing through AI-generated messages that mimic real communications. Deepfakes can create realistic impersonations, leading to financial fraud and extortion, as demonstrated by a 2024 incident resulting in a million loss. Deepfakes also pose risks for manipulation and disinformation, affecting public perception and market dynamics. On the defensive side, AI is utilized in cybersecurity to detect and prevent attacks through anomaly detection, zero-trust security models, and advanced authentication methods. Human training and awareness are crucial for recognizing AI-generated threats. Effective defense requires regulations, shared accountability, and preparedness within organizations, including continuous monitoring and employee training. Collaboration between public agencies and private security firms is essential for a robust response to cyber threats.
AppWizard
December 2, 2025
Recent findings have revealed that certain widely-used Android applications have been involved in an adware campaign, identified as 'GhostAd', which drains phone resources and disrupts normal usage. This malicious software disguised itself as utility and emoji-editing tools and infiltrated at least 15 applications, targeting unsuspecting users. Many of these compromised apps were available on Google’s Play Store, including the GenMoji Studio app, which became popular in the 'Top Free Tools' category. Users reported issues such as disappearing app icons, intrusive advertisement pop-ups, and sluggish device performance after installation. Google has removed all compromised applications from its Play Store, but users who installed them must manually delete the harmful software. Check Point noted that the GhostAd campaign blurs the line between marketing and malware, repurposing users' phones to generate revenue. To protect against future threats, users are advised to scrutinize app reviews, verify the app creator's reputation, and exercise caution with permissions.
AppWizard
December 2, 2025
A new Android malware named Albiriox has emerged, marketed as malware-as-a-service (MaaS). It features a hard-coded list of over 400 applications, including banking and cryptocurrency platforms, and is distributed through social engineering tactics using dropper applications. Initially advertised in late September 2025, it became a full MaaS offering by October, with Russian-speaking threat actors behind its development. Albiriox allows remote control of compromised devices via an unencrypted TCP socket connection and Virtual Network Computing (VNC), enabling attackers to extract sensitive information and perform overlay attacks for credential theft. One campaign targeted victims in Austria using German-language lures and counterfeit Google Play Store listings. Albiriox also utilizes Android's accessibility services to bypass security measures and employs a novel distribution strategy involving a counterfeit website that collects phone numbers. Additionally, another Android MaaS tool, RadzaRat, was introduced, masquerading as a file management utility while offering extensive surveillance and remote control capabilities. RadzaRat can log keystrokes and maintain persistence through specific permissions, highlighting a trend in the availability of sophisticated cybercrime tools.
Tech Optimizer
December 2, 2025
Surfshark is offering its Surfshark One Antivirus plan for .19 per month over a 27-month period, which is an 88% discount from the regular rate. The total cost for this plan amounts to approximately . This bundle includes real-time antivirus scanning, a VPN, breach alerts, and a private search tool. The deal is particularly beneficial for holiday shoppers, as cybercriminal activity increases during this time. The plan is advantageous for frequent travelers, families, and students.
Search