New Jersey Town Website Hacked 8 Times in 20 Days
Website is currently down, nobody knowns who hacked it. Between July 7 and July 26, the date of the last reported hack, the website of the Harrison city council, townofharrison.com, hasRead More →
Malware News | Infosec Blog | Information Security Tutorials
Website is currently down, nobody knowns who hacked it. Between July 7 and July 26, the date of the last reported hack, the website of the Harrison city council, townofharrison.com, hasRead More →
X-Tunnel is roughly based on XTunnel PortMap. One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC) back in April 2016 is based on aRead More →
Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums.Read More →
TIM BRYANT AND Brian Knudson spent two years preparing for the Cyber Grand Challenge, a $55 million hacking contest cooked up by Darpa, the visionary research operation inside the U.S.Read More →
A new wave of Locky malware emails have been making the rounds since yesterday — July 20, 2016 — with a critical new development, whereby the Windows executable is nowRead More →
The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices. Last time we blogged about malware on GoogleRead More →
When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the Chimera ransomware. They have been leaked online and sharedRead More →
Short Bytes: TOR anonymity network is one of the most useful online security measures that we’ve got. However, attackers have come up with new ways to puncture this security envelopeRead More →
Despite being older than many of its users, Short Messaging Service (SMS) remains a very popular communications medium and is increasingly found on remote sensors, critical infrastructure and vehicles dueRead More →
Hack can be carried out by operators of Wi-Fi hotspots, where HTTPs is needed most. A key guarantee provided by HTTPS encryption is that the addresses of visited websites aren’t visibleRead More →
A new website set up by Europol, Intel and Kaspersky to help resist the threat of ransomware could allow you to recover encrypted data for free. The site is designedRead More →
Researchers have crafted a stealthy new way of bypassing Windows User Account Controls (UAC) that opens the door to attacks on targeted systems. According researchers, the bypass technique can fly underRead More →
PHP project fixes issues affecting all PHP versions 5.3+ A team of three researchers went so far as to search and discover a PHP zero-day so they could hack PornHub asRead More →
Adwind author still has a lot of work ahead of him. Security researchers have observed an instance of the Adwind RAT dropping a Mac payload for the first time, but despiteRead More →
Far too many otherwise intelligent and talented software developers these days apparently think they can get away with writing, selling and supporting malicious software and then couching their commerce asRead More →
The crooks behind the recent campaign may be from China. Over 100,000 South Koreans had their banking credentials stolen by crooks who leveraged the BlackMoon banking trojan, also detected asRead More →
A new ransomware has been discovered by AVG malware analyst @JakubKroustek called HolyCrypt. This ransomware is written in Python and compiled into a Windows executable using PyInstaller. This allows the developer to distributeRead More →
A decryptor has been released by ransomware expert BloodDolly that will allow victim’s encrypted by the ODCODC Ransomware to recover their files for free. Though the Command & Control serversRead More →
Dell SonicWall equipment came with a hidden account. Security researchers have discovered six serious security issues that plague several Dell SonicWall products, one of which is a hidden account with easy-to-guessRead More →
Australia is being hit hard by ransomware attacks and we’ve heard a lot of security vendors advise against paying the ransom that cybercriminals demand to decrypt locked files. But RSARead More →