Hackers Selling Counterfeit Phones With Crypto-Stealing Malware Worldwide

Hackers Selling Counterfeit Phones With Crypto-Stealing Malware Worldwide

Cybercriminals are taking advantage of unsuspecting buyers by selling counterfeit Android smartphones preloaded with crypto-stealing malware. According to cybersecurity firm Kaspersky Labs, thousands of compromised devices have been found in circulation, with hackers using a variant of the notorious Triada Trojan to gain complete control over victims’ phones. The preinstalled malware allows attackers to steal cryptocurrencies, intercept two-factor authentication (2FA) messages, and replace wallet addresses to reroute funds. Kaspersky’s research has identified 2,600 confirmed infections globally, with the majority of cases reported in Russia within the first three months of 2025. The criminals behind this scheme have reportedly managed to … Read more

Chrome and Firefox Patch Sandbox Vulnerabilities Exploited by Hackers

Chrome and Firefox Patch Sandbox Vulnerabilities Exploited by Hackers

Cybersecurity threats continue to evolve, and web browsers are among the most frequently targeted software. Google and Mozilla have recently patched critical vulnerabilities in their Chrome and Firefox browsers, respectively, to address zero-day exploits that allowed attackers to bypass security restrictions. The Chrome vulnerability, tracked as CVE-2025-2783, was actively exploited in phishing campaigns targeting individuals in Russia, while Mozilla discovered a similar flaw, CVE-2025-2857, in its Firefox browser. These vulnerabilities highlight the persistent threats posed by sophisticated cyberattacks and the importance of timely security updates. Google’s Emergency Chrome Patch Google released an emergency patch for Chrome on Windows following the … Read more

Secret Commands in Bluetooth Chip Pose Major Security Threat Worldwide

Secret Commands in Bluetooth Chip Pose Major Security Threat Worldwide

A potentially severe cybersecurity issue has been uncovered that could impact over a billion devices worldwide. Cybersecurity researchers at Tarlogic have discovered hidden commands embedded in a Bluetooth chip widely used in various devices, including smartphones, computers, IoT devices, and medical equipment. These secret commands, which were not publicly documented, could allow hackers to impersonate trusted devices, spy on users, and steal sensitive information. The vulnerable Bluetooth chip, known as ESP32, is manufactured by the China-based company Espressif, which has reportedly sold more than one billion of these chips globally. The Discovery of Hidden Commands in Bluetooth Chips The research … Read more

Windows 10 Support end Threatens Majority of Active PCs

Windows 10 Support end Threatens Majority of Active PCs

As the October 2025 deadline for Windows 10 support end support looms, the cybersecurity community is raising urgent alarms. Despite Microsoft’s push to transition users to Windows 11, only about 30% of Windows PCs globally have adopted the newer OS. The remaining 60%—representing millions of active systems—are still running Windows 10. This leaves users facing tough decisions: upgrade to Windows 11, purchase a new device, or risk significant vulnerabilities after support ends. A Decade of Dominance Windows 10, launched in 2015, has enjoyed a decade of dominance as Microsoft’s flagship operating system. It is currently the most widely used OS … Read more

16 Chrome Extensions Hacked: Full List and Prevention Guide

16 Chrome Extensions Hacked: Full List and Prevention Guide

The Breach: 16 Chrome Extensions Hacked A new cybersecurity threat has emerged with the hacking of 16 Chrome extensions, leaving over 600,000 users exposed to data theft and credential compromise. This large-scale attack has highlighted vulnerabilities in browser security, with extensions being exploited as a backdoor for malicious activities. The attack involved phishing campaigns targeting developers of legitimate Chrome extensions. Once access was gained, attackers injected malicious code, enabling them to steal cookies, user access tokens, and identity data while communicating with external command-and-control (C&C) servers. How the Attack Worked The attackers used phishing emails disguised as urgent notifications from … Read more

Which of the Following is Not a Risk Associated with Near Field Communication?

Which of the Following is Not a Risk Associated with Near Field Communication?

As we delve into Near Field Communication (NFC), demystify worries. “Which of the Following is Not a Risk Associated with Near Field Communication?” Explore its secure tech landscape in this TechyNerd guide. What does NFC mean on my phone? Near Field Communication (NFC) is a short-range wireless technology facilitating data exchange between devices & reading NFC-equipped cards over short distances. Key functionalities include mobile payments, data transfer between devices, instant pairing with Bluetooth devices, & reading information from NFC tags. Despite its short wireless range, NFC is a convenient feature, commonly utilized in daily activities such as mobile payments & … Read more

How Can an Attacker Execute Malware Through a Script? 5 Safety Tips

How Can an Attacker Execute Malware Through a Script?

In our ever-changing digital landscape, where technology advances at an astonishing pace, so do the strategies of malicious attackers. Among the myriad threats we face, the question of “How Can an Attacker Execute Malware Through a Script?” has emerged as a particularly sinister adversary. In this extensive guide, we’ll not only explore the intricate workings of these attacks but also delve into the human aspect of the fight against them, providing you with essential safety tips to secure your digital presence. What is Script-Based Malware Attacks? Script-based malware attacks use programs or codes written in languages such as JavaScript or … Read more

How to Get Rid of Ultra Search Engine: 7 Effective Steps

How to Get Rid of Ultra Search Engine: 7 Effective Steps

Are you fatigued by the bothersome Ultra Search Engine encroaching upon your internet browsing experience? ​ Numerous individuals encounter frustration with intrusive search engines that appear to dominate their online activities. In this TechyNerd article, we will provide you with a step-by-step guide on reclaiming control & instruct you on How to Get Rid of Ultra Search Engine. What is Ultra Search Engine? Ultra Search Engine, like many other intrusive search engines, is a persistent nuisance and act as a Malware. It might have crept into your browser without your consent, and it’s known for redirecting your searches to its own … Read more