New backdoor attacks Windows users
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote access to the user’s private information. Recently, DoctorRead More →
Backdoors are typically designed to execute cybercriminals’ commands on the infected machine. As a rule, they are used to gain a remote access to the user’s private information. Recently, DoctorRead More →
New York (AFP) – The founder of an online underworld bank that allegedly laundered billions of dollars for criminals was sentenced Friday to 20 years in prison. Arthur Budovsky, 42,Read More →
7ev3n ransomware appeared at the beginning of this year. In addition to typical features of encrypting files, it was blocking access to the system using a fullscreen window, and wasRead More →
.. but security researchers already cracked it According to security experts from Cylance, in the underground world of ransomware peddlers, there’s no ransomware kit better than AlphaLocker, sold by a RussianRead More →
Simple attacks plus user willingness to pay ransoms to get their files back means ransomware is on the rise, warn Kaspersky researchers. Ransomware has replaced advanced persistent threat (APT) networkRead More →
Lenovo Solution Center allowed attackers to get admin access. Lenovo has hid a crucial security update in an old security advisory from last year. The advisory details fixes for a vulnerabilityRead More →
A few months ago, we reported on a white hack against Dridex where the malicious payload was removed and an Avira antivirus downloader added. It seems that a very successfulRead More →
AS FAR AS made-up holidays go, “World Password Day” doesn’t quite have the same cachet as, say, Father’s Day, or even National Pancake Day (March 8th). Still, it’s as goodRead More →
Today, we’ve been alerted about an ongoing spam campaign against Skype users. The majority of those affected are in India, Japan, and the Philippines. Below is what the message looksRead More →
Short Bytes: There are some very certain prime numbers that are illegal. Yes, having them in your possession or sharing them with somebody could get your arrested. The known factRead More →
Fix still isn’t available for most users, and many will probably never get it.For the past five years, a vulnerability in many Android phones has left users’ text messages, callRead More →
Today, we have encountered a new threat that’s a blast from the past. The Petya Trojan (detected by Kaspersky Lab products as Trojan-Ransom.Win32.Petr) infects the MBR preventing normal system loading,Read More →
We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on social media sites. What also struck us theRead More →
Several popular webmail providers are investigating a report that millions of their users’ login details are being shared online by a hacker. Google Gmail, Yahoo Mail, Microsoft Hotmail and Mail.ruRead More →
CryptMix is a mashup of CryptXXX and CryptoWall. A new type of ransomware created and distributed by a group of crooks calling themselves the Charity Team is trying to encourage usersRead More →
A YouTube video’s best day, traffic-wise, is usually the day it gets posted. Clicks generally decline quickly and post-launch spikes are rare. On Dec. 18, a year-old jihadist video calledRead More →
The Linux Foundation says a new Core Infrastructure Initiative (CII) Best Practices Badge program launched Tuesday will help companies interested in adopting open source technologies evaluate projects based on security,Read More →
Following the recent security breach suffered by the Qatar National Bank has assured that its systems are “fully secure”. Sequel to a recent cyber-attack that led to a large chunkRead More →
Android phones may soon be able to send and receive iMessages thanks to a new open-source app called PieMessage. You can check out the work-in-progress app in action in the videoRead More →
Hey Folks! So late last year a quote was going around about a comment for the Special Agent in charge of the Cyber Intelligence program for a Boston branch ofRead More →