Stanford University Site Hosted Malware for Months
For almost four months, script kiddies ran amok in one of Stanford’s subdomains, installing web shells, mailers, and other types of web malware. The infection was noticed last week byRead More →
Malware News | Infosec Blog | Information Security Tutorials
For almost four months, script kiddies ran amok in one of Stanford’s subdomains, installing web shells, mailers, and other types of web malware. The infection was noticed last week byRead More →
A man linked to an auto parts store in a disputed territory of Moldova is behind the Bachosens malware, a backdoor trojan used in a very small number of attacks,Read More →
In what has become a welcome trend, today another ransomware master decryption key was released on BleepingComputer.com. This time the key that was released is for the XData Ransomware thatRead More →
The impact of data breaches can be measured in a company’s share price and customer churn. A data breach can have a significant affect on a company’s share price: howRead More →
The Fast-food chain Chipotle notified users a security breach, hackers compromised its point of sale terminals to steal payment card data. The Mexican Grill Fast-food chain Chipotle notified users aRead More →
Google has removed 41 Android apps from the official Play Store. The apps were infected with a new type of malware named Judy, and experts estimate the malware infected betweenRead More →
On May 21st, a security researcher who goes by the name Thyrex, received a message on a Russian forum that contained a link to a ZIP file that supposedly contained aRead More →
An eight-month-long investigation by Roman Unuchek, a security researcher at Kaspersky Lab, has uncovered one of the most complex malware distribution schemes seen to date on the Android malwareRead More →
The volume of 64-bit malware in the wild remains low even though computers running 64-bit operating systems became ubiquitous years ago. The vast majority (93 per cent) of new computersRead More →
Whenever I get a shell on a Windows system with VMware installed I feel a certain frustration at not being able to access the filesystem of the available virtual machines.Read More →
Malware authors have a new UAC bypass technique at their disposal that they can use to install malicious apps on devices running Windows 10. Responsible for discovering this new UACRead More →
Russian authorities have arrested the Cron malware gang, responsible for selling the Tiny.z Android banking trojan and the PonyForx Windows infostealer. The investigation was of massive proportions and authorities arrestedRead More →
On Friday, North Korea denied allegations that it was somehow responsible for the WannaCry ransomware outbreak that affected over 240,000 computers in nearly 200 countries across the globe. Speaking atRead More →
Fedora, openSUSE and Ubuntu are now available in the Windows Store, making life easier for Windows-dominant organizations to run open source software. I’m a Linux user. And, as the oldRead More →
Security researchers have had a busy week since the WannaCry ransomware outbreak that wreaked havoc on computers worldwide. News of the infection and the subsequent viral images showing everything fromRead More →
A tool released on Friday decrypts PCs running a fuller suite of Windows versions. New hope glimmered on Friday for people hit by last week’s virulent ransomware worm after researchersRead More →
Decryption tool is of limited value, because XP was unaffected by last week’s worm. Owners of some Windows XP computers infected by the WCry ransomware may be able to decryptRead More →
Yes, WannaCry is horrible. It locked people’s files and ruined businesses all over the world. With that being said, that doesn’t mean people can’t have fun with it. Over theRead More →
Next time someone links you to whatsapp.com, make sure you take a second look. There’s some adware currently circulating around the web by tricking users to visit a ‘шһатѕарр.com’ domainRead More →
WikiLeaks Reveals two distinct malware platforms codenamed AfterMidnight and Assassin used by the CIA operators to target Windows systems. While critical infrastructure worldwide and private organizations were ridiculed by the WannaCryRead More →