Petya – Taking Ransomware To The Low Level
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on theRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Petya is different from the other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on theRead More →
Hacking like in the movies! Sometimes it’s that easy.If you ever want to impress your friends and hack doors with one command and a push of a button, like inRead More →
Chinese state media is full of praise for the hacker accused of stealing a US F-35 Fighter Plane. A state-run media last Wednesday said that spying on the US is aRead More →
Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites. In late August 2015, Symantec identified a previously unknownRead More →
In-brief: Andrew Auernheimer, an online provocateur who uses the handle “Weev,” has taken credit for causing 30,000 Internet connected printers to spew out antisemitic statements. Many of the connected printersRead More →
The websites and web applications are mission-critical business systems that must operate without security problems to process corporate confidential information. And to respect data protection rules, companies must consider webRead More →
One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lotRead More →
A new ransomware has been discovered by security researcher Yonathan Klijnsma called Maktub Locker that shows the most attention to detail that I have see on its ransomware payment site. Before we get toRead More →
How-to guide also included, showing sysadmins how to protect their enterprises from malicious macro malware. Microsoft is finally addressing the elephant in the room in terms of security for Office usersRead More →
Softpedia talked with Sean Willians, author of Cryptostalker. A while back, we stumbled upon an interesting GitHub repo dubbed randumb, which included an example called Cryptostalker, advertised as a tool toRead More →