7ev3n Ransomware trashes your PC and then demands 13 Bitcoins
A new ransomware has been spotted called 7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin ransom demand is the largest we have seenRead More →
A new ransomware has been spotted called 7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin ransom demand is the largest we have seenRead More →
Not all victims can decrypt their files, only the lucky few. Some of the people infected with the NanoLocker ransomware may have a reason to celebrate after an independent security researcherRead More →
It is the joke of these hours,users are sharing a link to crashsafari.com on social media platform that could crash friends’ iPhone and iPad. Do not open any a linkRead More →
Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a regular basis, and what was once dubbed aRead More →
OpKillingBay – A group of hackers linked to the Anonymous collective shut down the Japanese Airport Website to protest against the slaughter of Dolphin. The collective Anonymous has launched a DDoS attack thatRead More →
Casey Smith recently shared his research on twitter, which is to reverse HTTP Shell by using JavaScript. I found it rather interesting and further analyzed this technique. 0x01 Introduction ObservingRead More →
Apple has taken a strong stance on privacy ever since the FBI began loudly demanding encryption backdoors into its products. The company’s statements about its iMessage service seem plain asRead More →
Another educational open-source ransomware project goes bad. Cyber-crooks have used the open-source code of the EDA2 ransomware to create the Magic ransomware strain, which has been spotted in real-life attacksRead More →
This homemade Robot Can Solve A Rubik’s Cube In A Flash (Video). YouTubers, Jay Flatland and Paul Rose have uploaded a video this month that demonstrates their mechanical solver thatRead More →
LeChiffre is yet another ransomware that recently has been observed to cause some major damage (in Mumbai – read more here). Not much material about it is available, so weRead More →
Attackers are adding unauthorized code at the top of infected websites, over 3,500 8sites already infected. Alarms are ringing in Symantec’s offices, as its research team has discovered a massiveRead More →
In recent variants of the infamous DNS-changer adware we have found that the coders use a particularly interesting method to bypass the default restrictions imposed for executing Powershell scripts. ExecutionRead More →
In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 theRead More →
Scans for Fortinet devices have intensified. An unknown group has been scanning the Internet for old Fortinet equipment that includes a secret SSH backdoor account that can be exploited to takeRead More →
Two weeks ago, the Comodo Threat Research Lab discovered a malware campaign aimed at businesses and consumers using the WhatsApp mobile messaging service. That attack used official looking emails masqueradingRead More →
Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle through the server’s contents. At the time, researchersRead More →
Highly privileged account could be used to hack customers’ networks, researchers warn. A company that supplies audio-visual and building control equipment to the US Army, the White House, and otherRead More →
GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government Communications Headquarters), has already developed a phone encryptionRead More →
Malvertisers are once again abusing ad technology platform AdSpirit and exposing visitors of the MSN homepage to malware. These attacks appeared to have been primarily focused on Germans users viaRead More →
Apple fixes vulnerability 2.5 years after receiving private report. Apple has squashed a bug in its iOS operating system that made it possible for hackers to impersonate end users whoRead More →