As of Today, US Law Enforcement Has New Hacking Powers
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify theRead More →
Malware News | Infosec Blog | Information Security Tutorials
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify theRead More →
Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts and Wi-Fi information. It also takes pictures, capturesRead More →
As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breachedRead More →
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and checkRead More →
The Kangaroo ransomware is the latest ransomware from the developer behind the Apocalypse Ransomware, Fabiansomware, and Esmeralda. What makes this version stand out a bit more is the use ofRead More →
The technical nature of cyber crime can sometimes obscure the fact that creating, using, and distributing malware, phishing kits and other threats is a business, albeit an illegitimate one. LikeRead More →
Short Bytes: The Tor Project has released Tor Phone–a privacy-focused and secure version of Android mobile OS. It’s based on Copperhead OS, a hardened Android distribution. Tor Phone also usesRead More →
Websites offering free keygens for various enterprise software applications are helping crooks spread the Gatak malware, which opens backdoors on infected computers and facilitates attacks on a company’s internal network,Read More →
An ongoing spam campaign is using boobytrapped image files to download and infect users with the Locky ransomware, Israeli security firm Check Point reports. aMalware authors are spreading malicious imageRead More →
Admittedly, that’s somewhat of a click-bait blog post title but bear with us, it’s for a good reason. Lots of work goes on behind the scenes of Kali Linux: toolsRead More →