Categories
Introductions

Top 12 Dropbox Alternatives

Dropbox cloud storage is one of the best and almost everyone’s favorite cloud storage service out there to store, share, and manage files & media. This is the best free cloud storage when you take into account it’s very easy to use and quick action and response, it wins most of the competition. It syncs […]

Categories
Cybersecurity

The most popular file sharing sites used by hackers

Cybercriminals and hackers often use popular file sharing sites to distribute their malicious files. A lot of these file sharing websites do not perform an AV scan on the files which are uploaded, putting unaware users at risk which are “socially engineered” by the cybercriminal / hacker. We have decided to create this list in […]

Categories
Cybersecurity Downloads

Dropbox has blocked these 85100 passwords (complete list included)

The file sharing environment DropBox is using a massive list of 85100 passwords to prevent their users from using unsafe passwords which can be guessed by cybercriminals that are using dictionary brute force attacks. The complete list which contains 85100 restricted passwords has been published by the security researcher Jerod Brennen. You can use the […]

Categories
Cybersecurity Malware

Spear Phishing Pacman cryptolocker campaign: Targets chiropractors environments

The CSIS Denmark security company has provided information about a new malware campaign which is targeting Chiropractors. The CSIS company discovered the Pacman malware when they analyzed a spear-phishing email which was sent to a Chiropractor. The Spear-phishing email claims that it has a message about a “patient” and that the chiropractor has to read the […]

Categories
Cybersecurity

DropBox Phishing Emails are circulating the web

Hackers and cybercriminals are trying to obtain access to specific and random DropBox accounts by sending DropBox Phishing Emails to thousands of email addresses which probably have been obtained via the black-market on the Darknet. The DropBox Phishing Emails claim that a specific file has been shared by a person you might/do not know. The […]