Cyber Crime

The dangerous interaction between Russian and Brazilian cyber criminal undergroundThe dangerous interaction between Russian and Brazilian cyber criminal underground

The dangerous interaction between Russian and Brazilian cyber criminal underground

Kaspersky has analyzed the interaction between the Russian and Brazilian criminal underground communities revealing a dangerous interaction. In the past weeks,…

9 years ago
The Linux Remaiten malware is building a Botnet of IoT devicesThe Linux Remaiten malware is building a Botnet of IoT devices

The Linux Remaiten malware is building a Botnet of IoT devices

Experts from the ESET firm have spotted a new threat in the wild dubbed Remaiten that targets embedded systems to…

9 years ago
The KimcilWare Ransomware targets Magento PlatformsThe KimcilWare Ransomware targets Magento Platforms

The KimcilWare Ransomware targets Magento Platforms

Security experts from the MalwareHunterTeam have discovered KimcilWare ransomware, a malware specifically designed to target Magento e-commerce platforms. Security experts…

9 years ago
TreasureHunt PoS Malware targets small retailers and banksTreasureHunt PoS Malware targets small retailers and banks

TreasureHunt PoS Malware targets small retailers and banks

Security experts at FireEye have spotted the activity of a criminal organization that using the custom PoS malware TreasureHunt to…

9 years ago
vBulletin resets passwords after a targeted attackvBulletin resets passwords after a targeted attack

vBulletin resets passwords after a targeted attack

vBulletin has suffered a severe attack last week that breached one of the Germany servers, in response it informed users…

9 years ago
Following revelations on Paris attacks, US lawmakers target burner phonesFollowing revelations on Paris attacks, US lawmakers target burner phones

Following revelations on Paris attacks, US lawmakers target burner phones

Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of…

9 years ago
Feds request Judge to review the order to reveal TOR Exploit CodeFeds request Judge to review the order to reveal TOR Exploit Code

Feds request Judge to review the order to reveal TOR Exploit Code

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed…

9 years ago
Bitdefender Vaccine now supports also CTB-Locker, Locky, TeslaCryptBitdefender Vaccine now supports also CTB-Locker, Locky, TeslaCrypt

Bitdefender Vaccine now supports also CTB-Locker, Locky, TeslaCrypt

The prevention is better that the cure, users can immunize their PC against CTB-Locker, Locky and TeslaCrypt using Bitdefender Anti-ransomware…

9 years ago
FBI breaks into San Bernardino shooter’s iPhoneFBI breaks into San Bernardino shooter’s iPhone

FBI breaks into San Bernardino shooter’s iPhone

The Department of Justice says the FBI has broken into the iPhone used by the San Bernardino shooter, it no…

9 years ago
USB Thief, the new USB-based data stealing TrojanUSB Thief, the new USB-based data stealing Trojan

USB Thief, the new USB-based data stealing Trojan

USB Thief, the new USB-based data-stealing Trojan discovered by ESET that relies on USB devices in order to spread itself…

9 years ago