Ransomware dominates the threat landscape
Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt any of it was in reference to a good event.Read More →
Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt any of it was in reference to a good event.Read More →
Crooks use brand new potent feature to just show adware. A previously discovered and highly dangerous Android trojan has received an update in the form of a module that allows itRead More →
If it can happen to her, chances are it can happen to lots of people. In a scenario that’s growing increasingly common, the chief technologist of the US Federal Trade CommissionRead More →
Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile applications. Following Check Point’s responsible discloser, Facebook promptly fixed the vulnerability. What isRead More →
Introduction Ransomware authors are in a constant state of innovation. Two weeks ago, Invincea discovereda version of Cerber that could not only hold a victim’s machine hostage, but also potentiallyRead More →
Security experts are warning owners of Mitsubishi Outlander Plug-In Hybrid Electric Vehicle that their cars can be hacked via the automobile’s on-board WiFi network used for remote control of keyRead More →
Russia plans to leave Apple, Android behind by building its own smartphone software. Russia wants to create its own smartphone operating system in an effort to reduce its dependence on WesternRead More →
A new Jigsaw Ransomware variant was discovered today by security researcher Michael Gillespie that encrypts a victim’s data and then appends the.payms extension to them. The ransomware then requires a ransom paymentRead More →
Bad guys score a victory in their never-ending arms race with defenders. Drive-by attacks that install the once-feared TeslaCrypt crypto ransomware are now able to bypass EMET, a Microsoft-provided tool designedRead More →
100 million login credentials belonging to the users of the Russian social networking platform VK.com (VKontakte) are available for sale on the Dark Web. Another day another data breach, thisRead More →